Question 78:
Which of the following network vulnerability scan indicators BEST validates a successful, active scan?
Answer options:
A. The scan job is scheduled to run during off-peak hours. B. The scan output lists SQL injection attack vectors. C. The scan data identifies the use of privileged-user credentials. D. The scan results identify the hostname and IP address.