An external contractor, who has not been given information about the software or network architecture, is conducting a penetration test. Which of the followingBEST describes the test being performed?

A. Black box
B. White box
C. Passive reconnaissance
D. Vulnerability scan


Answer: A. Black box

Computer Science & Information Technology

You might also like to view...

When using the Data Filters command, which of the following is NOT a date reference?

A) Two Days Ago B) This Week C) This Month D) Last Year

Computer Science & Information Technology

A group of data points used in a graph become a data ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

The ____ event occurs when a user clicks or touches an element.

A. click B. submit C. focus D. load

Computer Science & Information Technology

When testing the insert logic in an ordered list we need at least four test cases to validate the insert logic: (1) insert a node into a null list, (2) insert a node before the first data node, (3) insert between two data nodes, and (4) insert after the last node.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology