An external contractor, who has not been given information about the software or network architecture, is conducting a penetration test. Which of the followingBEST describes the test being performed?
A. Black box
B. White box
C. Passive reconnaissance
D. Vulnerability scan
Answer: A. Black box
You might also like to view...
When using the Data Filters command, which of the following is NOT a date reference?
A) Two Days Ago B) This Week C) This Month D) Last Year
A group of data points used in a graph become a data ________
Fill in the blank(s) with correct word
The ____ event occurs when a user clicks or touches an element.
A. click B. submit C. focus D. load
When testing the insert logic in an ordered list we need at least four test cases to validate the insert logic: (1) insert a node into a null list, (2) insert a node before the first data node, (3) insert between two data nodes, and (4) insert after the last node.
Answer the following statement true (T) or false (F)