Which of the following is used to purposely attack a system to exploit vulnerabilities?
A . Honeypot
B . Vulnerability scan
C . Device hardening
D . Penetration testing
Answer: D
Which of the following is used to purposely attack a system to exploit vulnerabilities?
A . Honeypot
B . Vulnerability scan
C . Device hardening
D . Penetration testing
Answer: D