The process of attempting to exploit a weakness in a network after being given permission by the company is known as:

Posted by: Pdfprep Category: N10-007 Tags: , ,

The process of attempting to exploit a weakness in a network after being given permission by the company is known as:
A . penetration testing
B . vulnerability scanning
C . reconnaissance
D . social engineering

Answer: A

Leave a Reply

Your email address will not be published.