Your company has hired an outside security firm to perform various tests of your net- work. During the vulnerability scan you will provide that company with logins for various systems (i.e., database server, application server, web server, etc.) to aid in their scan. What best describes this ?