An IS auditor doing penetration testing during an audit of internet connections would:

A.
evaluate configurations.
B.
examine security settings.
C.
ensure virus-scanning software is in use.
D.
use tools and techniques available to a hacker.
Explanation:
Penetration testing is a technique used to mimic an experienced hacker attacking a live site by using tools and
techniques available to a hacker. The other choices are procedures that an IS auditor would consider
undertaking during an audit of Internet connections, but are not aspects of penetration testing techniques.