The purpose of ____ is to evaluate system security by attacking it.
A. penetration testing
B. network testing
C. system testing
D. process testing
Answer: A
Computer Science & Information Technology
You might also like to view...
A possible drawback of new versions of software is that files might not be backwardly ________ with existing files created with earlier versions of the software
Fill in the blank(s) with correct word
Computer Science & Information Technology
How does the pattern of data segments and ACK change, as compared to the fast Ethernet link?
What will be an ideal response?
Computer Science & Information Technology