A company is performing internal security audits after a recent exploitation on one of their proprietary applications. Sara, the security auditor, is given the workstation with limited documentation regarding the application installed for the audit. Which of the following types of testing methods is this?
A. Sandbox
B. White box
C. Black box
D. Gray box
Ans: D. Gray box
You might also like to view...
Which of the following settings could affect a user from joining a wireless network? (Choose all that apply.)
a. Incorrect SSID b. Incorrect encryption type c. Incompatible wireless adapter type d. Incompatible operating system
?What or who is Cortana? How do you interact with Cortana? List three things you can do with Cortana.
What will be an ideal response?
Which sentence is correct??
A. ?After a romantic marriage proposal, the couple took a limousine back to the city. B. ?After a romantic marriage proposal, a limousine took the couple back to the city.
Before you can generate random numbers in Visual Basic, you first need to create a ________.
A. Random object B. Random container C. Random control D. Random string