A security firm has been engaged to assess a software application. A production-like test
environment, login details, production documentation and source code have been provided. Which
of the following types of testing is being described?
A.
White box
B.
Gray box
C.
Black box
D.
Red teaming
Explanation: