A(n) ____ uses all the techniques and tools available to an attacker in an attempt to compromise or penetrate an organization's defenses.
A. audit
B. penetration test
C. ruleset review
D. hash
Answer: B
Computer Science & Information Technology
You might also like to view...
A(n) __________ is a resource to which access is controlled.
A. object B. owner C. world D. subject
Computer Science & Information Technology
A(n) ___________________ is an object that defines a screen element used to display information or allow the user to interact with a program in a certain way.
a) GUI b) component c) event d) listener e) AWT
Computer Science & Information Technology