The first step in ____ is exploration, which is where the target is identified and characterized.

A. network testing
B. penetration testing
C. application testing
D. system testing


Answer: B

Computer Science & Information Technology

You might also like to view...

When files are broken into small pieces and are stored in nonadjacent or noncontiguous clusters on the disk, then file ________ has occurred

Fill in the blank(s) with correct word

Computer Science & Information Technology

When you ________ a selection, the selection is removed from the original location and is placed in the Clipboard

Fill in the blank(s) with correct word

Computer Science & Information Technology

What selection tool is the least efficient in selecting irregular areas of an image?

What will be an ideal response?

Computer Science & Information Technology

How does TCP provide flow control and reliability?

What will be an ideal response?

Computer Science & Information Technology