The first step in ____ is exploration, which is where the target is identified and characterized.
A. network testing
B. penetration testing
C. application testing
D. system testing
Answer: B
Computer Science & Information Technology
You might also like to view...
When files are broken into small pieces and are stored in nonadjacent or noncontiguous clusters on the disk, then file ________ has occurred
Fill in the blank(s) with correct word
Computer Science & Information Technology
When you ________ a selection, the selection is removed from the original location and is placed in the Clipboard
Fill in the blank(s) with correct word
Computer Science & Information Technology
What selection tool is the least efficient in selecting irregular areas of an image?
What will be an ideal response?
Computer Science & Information Technology
How does TCP provide flow control and reliability?
What will be an ideal response?
Computer Science & Information Technology