Which of the following would be used to identify the security posture of a network without actually
exploiting any weaknesses?
A.
Penetration test
B.
Code review
C.
Vulnerability scan
D.
Brute Force scan
Explanation:
Which of the following would be used to identify the security posture of a network without actually
exploiting any weaknesses?
Which of the following would be used to identify the security posture of a network without actually
exploiting any weaknesses?
A.
Penetration test
B.
Code review
C.
Vulnerability scan
D.
Brute Force scan
Explanation: