In which circumstance would a penetration tester perform an unauthenticated scan of a target?
- when user credentials were not provided
- when the number of false positive vulnerability reports is not required
- when time is limited and faster scans are required
- when only targets with UDP services are to be scanned
Explanation & Hint: Unauthenticated vulnerability scans do not use credentials to scan a target, so they are more likely to be used when a user or root-level credentials are unavailable or unknown.
|