A security specialist has been asked to evaluate a corporate network by performing a vulnerability
assessment. Which of the following will MOST likely be performed?
A.
Identify vulnerabilities, check applicability of vulnerabilities by passively testing security
controls.
B.
Verify vulnerabilities exist, bypass security controls and exploit the vulnerabilities.
C.
Exploit security controls to determine vulnerabilities and mis-configurations.
D.
Bypass security controls and identify applicability of vulnerabilities by passively testing security
controls.