Jane has recently implemented a new network design at her organization and wishes to passively identify security issues with the new network. Which of the following should Jane perform?
A.
Vulnerability assessment
B.
Black box testing
C.
White box testing
D.
Penetration testing