Ann, a security analyst from a large organization, has been instructed to use another, more effective scanning tool. After installing the tool on her desktop, she started a full vulnerability scan. After running the scan for eight hours. Ann finds that there were no vulnerabilities identified.
Which of the following is the MOST likely cause of not receiving any vulnerabilities on the network?
A . The organization has a zero tolerance policy against not applying cybersecurity best practices.
B . The organization had a proactive approach to patch management principles and practices.
C . The security analyst credentials did not allow full administrative rights for the scanning tool.
D . The security analyst just recently applied operating system level patches.
Answer: C