A security team has been provided with a non-credentialed vulnerability scan report created by a third-party. Which of the following would they expect to see on this report?
1) A summary of all files with invalid group assignments
2) A list of all unpatched operating system files
3) The version of web server software in use
4) A list of local user accounts