In course of the vulnerability scan you will provide that company with logins for various systems to aid in their scan, the term that best describes this is A privileged scan.
Intrusive scans try to take advantage of vulnerabilities once they are discovered. Use intrusive scanning with caution as it may interrupt your operational systems and processes, raise difficulties for your staff and customers, and highlight the potential danger and effect of a vulnerability.
Note that Credential-based vulnerability assessments, which use the admin account, do a more thorough examination by searching for issues that are hidden from network users.
Learn more about vulnerability scan from
https://brainly.com/question/10097616
#SPJ1