A security auditor is reviewing vulnerability scan data provided by an internal security team .
Which of the following BEST indicates that valid credentials were used?
A . The scan results show open ports, protocols, and services exposed on the target host
B . The scan enumerated software versions of installed programs
C . The scan produced a list of vulnerabilities on the target host
D . The scan identified expired SSL certificates
Answer: B
Latest SY0-601 Dumps Valid Version with 396 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund