Harry is planning to hire a consultant to perform a penetration test. He would like the test to simulate a real attack as closely as possible. What test type should he use?

What will be an ideal response?

Black box

Computer Science & Information Technology

You might also like to view...

Using the Network and Sharing Center, the Password protected sharing option ________

a. Enables the Standard Folder Sharing model b. Enables the Public Folder sharing model c. Increases security by limiting access of shared files and printers to only those who have a User account d. Enables access to shared music and videos on the network

Computer Science & Information Technology

A user receives an unsolicited call from a technician claiming to be from a Microsoft certified partner. The technician tricks the user into allowing them access to their PC because of malware alerts that were being broadcasted. Which of the following attacks is this user a victim of?

A. Shoulder surfing B. Phishing attack C. Social engineering D. Malware infection

Computer Science & Information Technology