The process of attempting to exploit a weakness in a network after being given permission by the company is known as:
A . penetration testing
B . vulnerability scanning
C . reconnaissance
D . social engineering
Answer: A
The process of attempting to exploit a weakness in a network after being given permission by the company is known as:
A . penetration testing
B . vulnerability scanning
C . reconnaissance
D . social engineering
Answer: A