Which of the following are examples of penetration testing methods? (Select the two best answers.)
A. The open source security testing methodology manual
B. OVAL
C. NIST penetration testing
D. CERDEC
A and C. The open source security testing methodology manual (OSSTMM) and NIST penetration testing are examples of penetration testing methods.
You might also like to view...
Answer the following statements true (T) or false (F)
1. Adding more RAM always will make the computer run faster. 2. Adding more disk space always will make the computer run faster. 3. Deleting a shortcut or alias will delete the file or folder to which it links. 4. Backing up a shortcut or alias will back up the file or folder to which it links.
Describe the component-level design for WebApps.
What will be an ideal response?
Many web-based e-mail providers offer _______________ services, such as Yahoo! Messenger and Google Talk.
Fill in the blank(s) with the appropriate word(s).
E-businesses that conduct forward auctions are following the _________________________ e-business model.
Fill in the blank(s) with the appropriate word(s).