To perform an “authenticated” scan that only targets “severity 5” vulnerabilities you require a Target host. This is further explained below.
Generally, Any domain from which a request to Target is made is referred to as a host. On a website, the location is almost always the most important element.
In conclusion, You'll need a Target host if you want to run a "authenticated" scan that only looks for "severity 5" vulnerabilities.
Read more about Target host
https://brainly.com/question/13051882
#SPJ1