PrepAway - Latest Free Exam Questions & Answers

The process of attempting to exploit a weakness in a network after being given permission by the company is kn

The process of attempting to exploit a weakness in a network after being given permission by the company is known as:

A. penetration testing

B. vulnerability scanning

C. reconnaissance

D. social engineering


Leave a Reply