Maria works as a professional Ethical Hacker. She recently has been assigned a project to test the
security of www.we-are-secure.com. The company has provided the following information about
the infrastructure of its network:
· Network diagrams of the we-are-secure infrastructure
· Source code of the security tools
· IP addressing information of the we-are-secure network
Which of the following testing methodologies is we-are-secure.com using to test the security of its
network?
A.
Graybox
B.
Blackbox
C.
Alpha testing
D.
Whitebox
Explanation: