corporation has employed a third-party company to perform black-box penetration on their network. The corporation will provide:

corporation has employed a third-party company to perform black-box penetration on their network. The corporation will provide:

corporation has employed a third-party company to perform black-box penetration on their network. The corporation will provide:

A.
full access to the network, except user-created databases.

B.
unrestricted approved access, provided that every action is logged.

C.
a test user account, but the company performs the network footprinting.

D.
no information regarding their topology or technologies.



Leave a Reply 0

Your email address will not be published. Required fields are marked *