“Testing the network using the same methodologies and tools employed by attackers” Identify the
correct terminology that defines the above statement.
A.
Vulnerability Scanning
B.
Penetration Testing
C.
Security Policy Implementation
D.
Designing Network Security
B