Which of the following processes will you involve to perform the active analysis of the system for
any potential vulnerabilities that may result from poor or improper system configuration, known
and/or unknown hardware or software flaws, or operational weaknesses in process or technical
countermeasures?
A.
Penetration testing
B.
Risk analysis
C.
Baselining
D.
Compliance checking