Which of the following are key purposes of running a credentialed scan in a vulnerability assessment?
1) Identifying vulnerabilities in the system
2) Assessing the impact of vulnerabilities on the system
3) Determining the severity of vulnerabilities
4) Providing recommendations for remediation