When performing a Remote Scan what kind of NVT's should be anabled?

When we are performing a Remote Scan(without credentials) not a Authenticated scan what kind of NVT’s should be enabled to get a useful report?

is such assignment correct?

Remote Scan:
Brute force attacks
Buffer overflow
Compliance
Databases
Finger abuses
Firewalls
Gain a shell remotly
General
Netware
NMAP NSE
NMAP NSE net
Policy
Port scanners
Priveleage escalation
Product detection
RPC
Peer to peer file sharing
Remote file acces
SMTP problems
snmp
ssl and tls
Service detection
settings
Useless services
WEb servers
Web application abuses
Windows
Windows : Microsoft Bulletins
FTP
Malware
Default Accounts
Denial of service
CISCO

Authenticated scan using local security checks:
AIX LOCAL Security checks
Amazon Linux Local Security checks
CENTOS LOcal Security Checks
Cintrix Xenserver LocalSecurity CHecks
DebianLocal Security Checks
FortiOS Local Security checks
Free BSD Loca Security checks
Gentoo Local Security Checks
HP UX Local Security checs
Oracle linux Local Security checks
PAlo alto pan OS Local security checsk
Red Hat local Security checks
slackware local security checks
solaris local securuty checks
suse local security checks
VMware local security checks
F5 Local Security Checks
Ubuntu Local Security Check

You can just use one of the pre-defined Scan config like “Full and Fast”. If you don’t give any credentials to the scanner the VTs are optimized in a way that they are not scheduling and launching Local Security Checks.