Credentialed vs Non-Credentialed (Vulnerability Scan)
Credentialed * scanner uses an authorized user or admin account * closer to system admin perspective * deeper scan, more vulnerabilities Non Credentialed * scanner without admin account * closer to hacker perspective
Discovery Scan (Vulnerability Scan)
* used to create entwork map to show connected devices in architecture
Full Scan (Vulnerability Scan)
* easy to see in network traffic when performed
Stealth Scan (Vulnerability Scan)
Compliance Scan (Vulnerability Scan)