Answer:
Include the answers on an additional sheet.
There are different type of vulnerability scan. The type of vulnerability scan mimics the work of a threat actor is called Credential Vulnerability Scan.
Credential Vulnerability Scan is known to be a scan in which there is a valid authentication of credentials Example are usernames and passwords etc. are known to be supplied to the vulnerability scanner to mimic the work of a threat actor that has these credentials.
They are known to be very slow but can give an in-depth insight into the system by accessing a wide range of the installed software
Learn more from
brainly.com/question/14728460
<h2>Answer :</h2>
Both Tech A and B
Tech A is correct, as in case of a tire is under inflated, the car tends to drag towards that side of the car which causes one-sided wear on one side of tread. Tech B is also correct as in case tire is over inflated, the surface area of that tire is majorly out of contact with the ground, due to which the center portion of the tread is affected.