Question 28
Main Page
Your security team recommends vulnerability scanning without credentials. What’s a key limitation of this approach?
A. Increased scan time
B. Inability to detect missing patches
C. Higher chance of privilege escalation
D. Reduced reporting complexity
Show Answer