Which of the following would be used to identify the security posture of a network without actually
exploiting any weaknesses?
A.
Penetration test
B.
Code review
C.
Vulnerability scan
D.
Brute Force scan
Which of the following would be used to identify the security posture of a network without actually
exploiting any weaknesses?
Which of the following would be used to identify the security posture of a network without actually
exploiting any weaknesses?
A.
Penetration test
B.
Code review
C.
Vulnerability scan
D.
Brute Force scan