The purpose of ____ is to evaluate system security by attacking it.

A. penetration testing
B. network testing
C. system testing
D. process testing

Answer: A

Computer Science & Information Technology

You might also like to view...

A possible drawback of new versions of software is that files might not be backwardly ________ with existing files created with earlier versions of the software

Fill in the blank(s) with correct word

Computer Science & Information Technology

How does the pattern of data segments and ACK change, as compared to the fast Ethernet link?

What will be an ideal response?

Computer Science & Information Technology