________ refers to the process of testing the organization's security posture using similar techniques and tools as those of an attacker, but with the knowledge and approval of the organization.

A Recon-ng
B Maltego
C Social engineering
D Penetration testing (pen testing)

Answer: D Penetration testing (pen testing)

Computer Science & Information Technology

You might also like to view...

To build a linked list, we can

A) start with an empty list, and then form an array of nodes. B) start with an empty list, and then perform a series of add item operations. C) use the constructor to create an array of nodes. D) call the list init function. E) None of the above

Computer Science & Information Technology

Hannah, a financial analyst, creates a balance sheet for one of her clients. When she prints the balance sheet, the content appears split at awkward places on the sheet. Hannah decides to reprint the sheet. In this scenario, Hannah should use the _____ to split the Excel sheet into logical segments.?

A. ?Quick Analysis tool B. ?manual page break C. ?automatic page break D. ?Header & Footer tool

Computer Science & Information Technology