__________, a level beyond vulnerability testing, is a set of security tests and evaluations that simulate attacks by a malicious external source (hacker).

A. Penetration testing
B. Penetration simulation
C. Attack simulation
D. Attack testing


Answer: A

Computer Science & Information Technology

You might also like to view...

Broadcast packets are ____ packets sent to every computer on a network.

A. UDP B. IP C. TCP D. SMPT

Computer Science & Information Technology

An Office feature in Word, Excel, and PowerPoint that enables you to change normal text into decorative stylized text

a. Picture effects b. WordArt c. Picture styles

Computer Science & Information Technology

Increasing the value in the Spacing Before option in the Paragraph dialog box will increase the amount of spacing ________ each paragraph of text in the selected placeholder

A) above B) to the right of C) below D) to the left of

Computer Science & Information Technology

Match the following worksheet functions with their category.

A. Text B. Date and Time C. Financial D. Lookup and Reference E. Math and Trigonometry F. Logical

Computer Science & Information Technology