A security firm has been engaged to assess a software application. A production-like test environment, login details, production documentation and source code have been provided. Which of the following types of testing is being described?
A.
White box
B.
Gray box
C.
Black box
D.
Red teaming