1. What Scanners Actually Do
$ core idea: Vulnerability scanners identify exposed services, inspect banners, test protocol behavior, and (in credentialed mode) query the host for installed packages, versions, and configurations. They estimate risk, but they do not replace validation and context.
$ defender angle: Scanner findings can include false positives, duplicate findings, and findings that are technically true but operationally low risk due to segmentation or disabled code paths. Analysts must interpret results with architecture knowledge.
$ prove understanding: Explain the purpose and limitations of unauthenticated scans.