Which of the following is the BEST method for assessing control effectiveness against technical vulnerabilities that could be exploited to compromise an information system?
A . Vulnerability scanning
B . Penetration testing
C . Systems log correlation analysis
D . Monitoring of intrusion detection system (IDS) alerts
Answer: B