An enterprise has hired an outside security firm to conduct penetration testing on its network and applications. The firm has only been given the documentation available to the customers of the applications.
Which of the following BEST represents the type of testing that will occur?
A . Bug bounty
B . Black-box
C . Gray-box
D . White-box
Answer: A