A security administrator logs onto a Windows server on her organization's network. Then she runs a vulnerability scan on that server. Which type of scan was conducted in this scenario
The credentialed scans were scans in which the scanning computer has had an account upon the computer being scanned.
It enables the software scanner to run a much more thorough check looking for faults that can also be detected from the network.
These are more successful since they have broader access to an organization's network.
Its connection reduces the exposure of your critical credentials to potential attackers while enabling your security team to execute critical security evaluations.