What type of penetration testing technique is used if the tester has no prior knowledge of the network infrastructure that is being tested?

A. white box
B. gray box
C. black box
D. sealed box

Answer: C

Computer Science & Information Technology

You might also like to view...

The Data Model allows you to use PowerPivot to create PivotTables using the data from multiple, related tables

Indicate whether the statement is true or false

Computer Science & Information Technology

Answer the following statements true (T) or false (F)

1) The selection sort is a simple and efficient algorithm. 2) After the ith iteration of an ascending order selection sort, the smallest i items of the array will be sorted in increasing order in the first i elements of the array. 3) Insertion sort is a simple and inefficient algorithm. 4) At the ith iteration of the insertion sort algorithm, the array will be sorted. 5) The merge sort algorithm sorts an array by splitting it into two equal- sized subarrays, sorting each subarray and merging them in one larger array.

Computer Science & Information Technology