The identification of vulnerabilities is usually done through ____ tests.
A. network
B. application
C. penetration
D. protocol
Answer: C
Computer Science & Information Technology
You might also like to view...
A filter may be applied to data when a report is viewed using the Layout view. ____________________
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
When you delete a file from the hard disk, it is moved to the Recycle Bin until you remove it permanently.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology