Understanding Vulnerability Scanning in Cybersecurity: Authenticated vs. Unauthenticated Scans