An external contractor, who has not been given information about the software or network architectu
re, is conducting a penetration test. Which of the following BEST describes the test being performed?
A. Black box
B. White box
C. Passive reconnaissance
D. Vulnerability scan