Attack  When is One Vulnerability Scanner Not Enough?

When is One Vulnerability Scanner Not Enough?