A method of evaluating the security of a computer system or a network by simulating an attack from a malicious source best describes

A) vulnerability assessment.
B) penetration test.
C) security breach.
D) cyber audit.

B

Business

You might also like to view...

What is the difference between a click-through rate and a conversion rate? Explain why marketers may want to use both metrics

What will be an ideal response?

Business

Memorizing your speech is the best delivery choice you can make

Indicate whether the statement is true or false.

Business