CompTIA Exam Questions

Which of the following would be used to identify the security posture of a network without actually

Which of the following would be used to identify the security posture of a network without actually
exploiting any weaknesses?

A.
Penetration test

B.
Code review

C.
Vulnerability scan

D.
Brute Force scan