__________ penetration testing is usually used when a specific system or network segment is suspect and the organization wants the pen tester to focus on a particular aspect of the target.

A. White box
B. Black box
C. Gray box
D. Green box


Answer: A

Computer Science & Information Technology

You might also like to view...

If you need a function to get both the number of items and the cost per item from a user, which would be a good function declaration to use?

a. int,float getData(); b. int getData(float cost); c. void getData(int count, float cost); d. void getData(int& count, float& cost);

Computer Science & Information Technology

What laws protect a U.S. citizen’s right to privacy? Would this have any bearing on people’s perception of personalization?

What will be an ideal response?

Computer Science & Information Technology

When the button at the bottom of the Tools panel in the accompanying figure is not selected, you are in ____ mode.

a. object drawing b. destructive c. selection d. merge

Computer Science & Information Technology

You are improving a legacy system. You need to customize a software life cycle for your project. Which activities would you need? In which order?

What will be an ideal response?

Computer Science & Information Technology