Following the completion of a network security assessment, which of the following can BEST be
demonstrated?
A.
The effectiveness of controls can be accurately measured
B.
A penetration test of the network will fail
C.
The network is compliant to industry standards
D.
All unpatched vulnerabilities have been identified