Which of the following best practices is used to identify areas in the network that may be vulnerable to penetration testing from known external sources?
A . Blue team training exercises
B . Technical control reviews
C . White team training exercises
D . Operational control reviews
Answer: A