A penetration tester is performing a remote scan to determine if the server farm is compliant with the company’s software baseline. Which of the following should the penetration tester perform to verify compliance with the baseline?
A. Discovery scan
B. Stealth scan
C. Full scan
D. Credentialed scan
Should be D. A credentialed scan will allow the use of an account with the proper permissions to check for compliance violations.
https://docs.tenable.com/nessus/Content/NessusCredentialedChecks.htm