Posted by: Pdfprep
Post Date: April 8, 2021
The process of attempting to exploit a weakness in a network after being given permission by the company is known as:
A . penetration testing
B . vulnerability scanning
C . reconnaissance
D . social engineering
Answer: A
Leave a Reply