A(n) ____ uses all the techniques and tools available to an attacker in an attempt to compromise or penetrate an organization's defenses.

A. audit
B. penetration test
C. ruleset review
D. hash


Answer: B

Computer Science & Information Technology

You might also like to view...

What is the output of the following program?

``` public class Test { public static void main(String[] args) { int[][] values = {{3, 4, 5, 1 }, {33, 6, 1, 2}}; for (int row = 0; row < values.length; row++) { java.util.Arrays.sort(values[row]); for (int column = 0; column < values[row].length; column++) System.out.print(values[row][column] + " "); System.out.println(); } } } ``` a. The program prints two rows 3 4 5 1 followed by 33 6 1 2 b. The program prints on row 3 4 5 1 33 6 1 2 c. The program prints two rows 3 4 5 1 followed by 2 1 6 33 d. The program prints two rows 1 3 4 5 followed by 1 2 6 33 e. The program prints one row 1 3 4 5 1 2 6 33

Computer Science & Information Technology

You can find coordinates of a particular point on an image by using an image-editing application such as ____ for Mac.

A. Paint B. Image C. Preview D. Photo

Computer Science & Information Technology

What type of communications rely on a timing mechanism using either an independent clock or a time stamp embedded in the communications?

A. Analog B. Digital C. Synchronous D. Asynchronous

Computer Science & Information Technology

Sophisticated computer systems require an extension of understanding visual images. This is called a _____ system. 

A. robotic B. perceptive C. learning D. virtual reality

Computer Science & Information Technology