A credentialed vulnerability scan is often preferred over a non-credentialed scan because credentialed scans: