Which of the following would be used to prove the existence of vulnerabilities on a network?
A.
Penetration testing
B.
Vulnerability assessment
C.
Business impact analysis
D.
Risk assessment
Which of the following would be used to prove the existence of vulnerabilities on a network?
Which of the following would be used to prove the existence of vulnerabilities on a network?
A.
Penetration testing
B.
Vulnerability assessment
C.
Business impact analysis
D.
Risk assessment