A security program manager wants to actively test the security posture of a system. The system is not yet in production and has no uptime requirement or active user base.Which of the following methods will produce a report which shows vulnerabilities that were actually exploited?

A. Peer review
B. Component testing
C. Penetration testing
D. Vulnerability testing

Answer: C. Penetration testing

Computer Science & Information Technology

You might also like to view...

Which of the following cable mediums is NOT susceptible to EMI?

A) UTP B) Wireless C) Fiber D) Coaxial

Computer Science & Information Technology

An external flash memory card reader that connects via an RJ14 port can be used when the destination device doesn't have a built-in reader.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology