A company hires outside security experts to evaluate the security status of the corporate network. All of the company's IT resources are outdated and prone to crashing. The company requests that all testing be performed in a way which minimizes the risk of system failures. Which of the following types of testing does the company want performed?
A. Penetration testing
B. WAF testing
C. Vulnerability scanning
D. White box testing
Answer: C. Vulnerability scanning
You might also like to view...
iPhones let you add SD flash cards
Indicate whether the statement is true or false
ONI's findings indicate that many countries engage in Internet ____________________ (intercepting and removing messages to prevent them from reaching their destination), and some do so extensively.
Fill in the blank(s) with the appropriate word(s).
Why do you think Susan prefers storing the inventory data in Access? What are the advantages to doing so? What are the disadvantages?
What will be an ideal response?
A(n) ____________________ should be subtle enough to provide contrast with the page text.
Fill in the blank(s) with the appropriate word(s).