What type of penetration testing technique is used if the tester has no prior knowledge of the network infrastructure that is being tested?
A. white box
B. gray box
C. black box
D. sealed box
Answer: C
You might also like to view...
Given the declaration Circle x, which of the following statement is most accurate?
a. x contains an int value. b. You can assign an int value to x. c. x is an object of the Circle type. d. x is a reference to a Circle object.
A(n) _______ can be thought of as an address that is used to direct a browser to a resource on the Web.
a) middle tier b) ASPX page c) URL d) query string
_____ is a radio-based wireless technology used to connect two or more devices together that are commonly within a close range of one another
Fill in the blank(s) with correct word
You can categorize digital information by using one or many different ____.
A. keywords B. tags C. cards D. indexes