According to the authors, scanning tools should use a combination of methods to identify vulnerabilities and that those methods will vary from product to product and are also dependent on whether host or network scanning is being performed and on the operating system of the target.