A method of evaluating the security of a computer system or a network by simulating an attack from a malicious source best describes
A) vulnerability assessment.
B) penetration test.
C) security breach.
D) cyber audit.
B
Business
A) vulnerability assessment.
B) penetration test.
C) security breach.
D) cyber audit.
B