PdfPrep.com

Which of the following is used to purposely attack a system to exploit vulnerabilities?

Which of the following is used to purposely attack a system to exploit vulnerabilities?
A . Honeypot
B . Vulnerability scan
C . Device hardening
D . Penetration testing

Answer: D

Exit mobile version