The system administrator created a file sharing service to the cloud for easier access for those working remotely. Which of the following tests should be performed to determine if services can be compromised?
A.
Test storage
B.
Test latency
C.
Vulnerability assessment
D.
Penetration testing
D.