A credentialed vulnerability scan is often preferred over a non-credentialed scan because credentialed scans:
A . generates more false positives.
B . rely solely on passive measures.
C . are always non-intrusive.
D . provide more accurate data.
Answer: D