Application of a new technology and is much superior to rival products
Answer: without satellites there would be no way for the world to communicate
Explanation:
There are different type of vulnerability scan. The type of vulnerability scan mimics the work of a threat actor is called Credential Vulnerability Scan.
Credential Vulnerability Scan is known to be a scan in which there is a valid authentication of credentials Example are usernames and passwords etc. are known to be supplied to the vulnerability scanner to mimic the work of a threat actor that has these credentials.
They are known to be very slow but can give an in-depth insight into the system by accessing a wide range of the installed software
Learn more from
brainly.com/question/14728460
<span>The best and most correct answer among the choices provided by the question is the fourth choice.
A way of determining that a site is realiable is examining comments about the <span>webpage.</span></span><span>
I hope my answer has come to your help. God bless and have a nice day ahead!</span>