All of the following should be identified within the penetration testing scope of work EXCEPT:
A.
a complete list of all network vulnerabilities.
B.
IP addresses of machines from which penetration testing will be executed.
C.
a list of acceptable testing techniques and tools to be utilized.
D.
handling of information collected by the penetration testing team.