Which of the following types of vulnerability scans typically returns more detailed and thorough insights into actual system vulnerabilities?