A(n) ____ uses all the techniques and tools available to an attacker in an attempt to compromise or penetrate an organization's defenses.

A. audit
B. penetration test
C. ruleset review
D. hash

Answer: B

Computer Science & Information Technology

You might also like to view...

A(n) __________ is a resource to which access is controlled.

A. object B. owner C. world D. subject

Computer Science & Information Technology

A(n) ___________________ is an object that defines a screen element used to display information or allow the user to interact with a program in a certain way.

a) GUI b) component c) event d) listener e) AWT

Computer Science & Information Technology