Which of the following would be used to prove the existence of vulnerabilities on a network?

Which of the following would be used to prove the existence of vulnerabilities on a network?

Which of the following would be used to prove the existence of vulnerabilities on a network?

A.
Penetration testing

B.
Vulnerability assessment

C.
Business impact analysis

D.
Risk assessment

Explanation:



Leave a Reply 0

Your email address will not be published. Required fields are marked *