CompTIA Exam Questions

The process of attempting to exploit a weakness in a network after being given permission by the com

The process of attempting to exploit a weakness in a network after being given permission by the company is known as:

A. penetration testing

B. vulnerability scanning

C. reconnaissance

D. social engineering