Which of the following is used to purposely attack a system to exploit vulnerabilities?

Posted by: Pdfprep Category: N10-007 Tags: , ,

Which of the following is used to purposely attack a system to exploit vulnerabilities?
A . Honeypot
B . Vulnerability scan
C . Device hardening
D . Penetration testing

Answer: D

Leave a Reply

Your email address will not be published.