Which of the following would be used to identify the security posture of a network without actually exploiting any weaknesses?
A.
Penetration test
B.
Code review
C.
Vulnerability scan
D.
Brute Force scan
Which of the following would be used to identify the security posture of a network without actually exploiting any weaknesses?
Which of the following would be used to identify the security posture of a network without actually exploiting any weaknesses?
A.
Penetration test
B.
Code review
C.
Vulnerability scan
D.
Brute Force scan