a black hat hacker is enumerating a network and wants to remain convert during the process.the hacker initiates a vulnerability scan.given the requirement of being convert, which of the following statements best indicates that the vulnerability scan meets these requirement