A company is performing internal security audits after a recent exploitation on one of their proprietary applications. Sara, the security auditor, is given the workstation with limited documentation regarding the application installed for the audit. Which of the following types of testing methods is this?

A. Sandbox
B. White box
C. Black box
D. Gray box


Ans: D. Gray box

Computer Science & Information Technology

You might also like to view...

Which of the following settings could affect a user from joining a wireless network? (Choose all that apply.)

a. Incorrect SSID b. Incorrect encryption type c. Incompatible wireless adapter type d. Incompatible operating system

Computer Science & Information Technology

?What or who is Cortana? How do you interact with Cortana? List three things you can do with Cortana.

What will be an ideal response?

Computer Science & Information Technology

Which sentence is correct??

A. ?After a romantic marriage proposal, the couple took a limousine back to the city. B. ?After a romantic marriage proposal, a limousine took the couple back to the city.

Computer Science & Information Technology

Before you can generate random numbers in Visual Basic, you first need to create a ________.

A. Random object B. Random container C. Random control D. Random string

Computer Science & Information Technology