CompTIA Exam Questions

Which of the following would be used to prove the existence of vulnerabilities on a network?

Which of the following would be used to prove the existence of vulnerabilities on a network?

A.
Penetration testing

B.
Vulnerability assessment

C.
Business impact analysis

D.
Risk assessment

Explanation: