corporation has employed a third-party company to perform black-box penetration on their network. The corporation will provide:
A.
full access to the network, except user-created databases.
B.
unrestricted approved access, provided that every action is logged.
C.
a test user account, but the company performs the network footprinting.
D.
no information regarding their topology or technologies.