Which of the following would be used to identify the security posture of a network without actually exploiting any weaknesses?

Which of the following would be used to identify the security posture of a network without actually exploiting any weaknesses?

Which of the following would be used to identify the security posture of a network without actually exploiting any weaknesses?

A.
Penetration test

B.
Code review

C.
Vulnerability scan

D.
Brute Force scan



Leave a Reply 0

Your email address will not be published. Required fields are marked *