This is a way to evaluate the security of the user’s network. This is accomplished by trying to exploit vulnerabilities in the network. This includes identifying any potential problems with the operating systems, services, and applications as well as verifying user adherence to policies.
What will be an ideal response?
penetration testing
Computer Science & Information Technology
You might also like to view...
Which of the following data structures is useful for traversing a given graph by breadth-first search?
a. Queue b. List c. Stack d. Linked list
Computer Science & Information Technology
?If the encoding value is known, one can insert the corresponding character directly into a web page using the character encoding reference _____.
A. ?code; B. ?&char; C. ? D. ?©
Computer Science & Information Technology
If a file's permissions are set to 760, what permission(s) are available to the group assigned to the file??
A. ?read B. ?write C. ?execute D. ?move
Computer Science & Information Technology
When a system demonstrates ____________________ feasibility, it operates as designed and implemented.?
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology