A security program manager wants to actively test the security posture of a system. The system is not yet in production and has no uptime requirement or active user base.Which of the following methods will produce a report which shows vulnerabilities that were actually exploited?
A. Peer review
B. Component testing
C. Penetration testing
D. Vulnerability testing
Answer: C. Penetration testing
Computer Science & Information Technology
You might also like to view...
Which of the following cable mediums is NOT susceptible to EMI?
A) UTP B) Wireless C) Fiber D) Coaxial
Computer Science & Information Technology
An external flash memory card reader that connects via an RJ14 port can be used when the destination device doesn't have a built-in reader.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology