An analyst notices that recent checks from a scanning tool return incomplete data for many targets. Which action best improves the depth of the collected results?
Exclude recently provisioned resources during busy hours
Set the port scan range to the most common ports used in production
Disable logging to reduce overhead for the next pass
Configure policies to include authentication for the target hosts
Providing valid credentials allows a scanning engine to inspect more detailed system data, such as patch levels and configuration files. This approach uncovers vulnerabilities that are inaccessible to non-authenticated scans. Changing port ranges or disabling logs may affect performance but do not increase visibility. Excluding additional hosts limits the overall test and may hide potential threats.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why does authentication improve scanning results?
Open an interactive chat with Bash
What are the risks of running scans without authentication?
Open an interactive chat with Bash
What is the difference between authenticated and unauthenticated scans?