Which of the following best practices is used to identify areas in the network that may be vulnerable to penetration testing from known external sources?

Posted by: Pdfprep Category: CS0-001 Tags: , ,

Which of the following best practices is used to identify areas in the network that may be vulnerable to penetration testing from known external sources?
A . Blue team training exercises
B . Technical control reviews
C . White team training exercises
D . Operational control reviews

Answer: A

Leave a Reply

Your email address will not be published.