PdfPrep.com

The process of attempting to exploit a weakness in a network after being given permission by the company is known as:

The process of attempting to exploit a weakness in a network after being given permission by the company is known as:
A . penetration testing
B . vulnerability scanning
C . reconnaissance
D . social engineering

Answer: A

Exit mobile version