Which of the following network vulnerability scan indicators BEST validates a successful, active scan?
A.
The scan job is scheduled to run during off-peak hours.
B.
The scan output lists SQL injection attack vectors.
C.
The scan data identifies the use of privileged-user credentials.
D.
The scan results identify the hostname and IP address.