A project lead is reviewing the statement of work for an upcoming project that is focused on identifying potential weaknesses in the organiza
tion-s internal and external network infrastructure. As part of the project, a team of external contractors will attempt to employ various attacks against the organization. The statement of work specifically addresses the utilization of an automated tool t
o probe network resources in an attempt to develop logical diagrams indication weaknesses in the infrastructure.
The scope of activity as described in the statement of work is an example of:
A. session hijacking
B. vulnerability scanning
C. social enginee
ring
D. penetration testing
E. friendly DoS