Maria works as a professional Ethical Hacker. She recently has been assigned a project to test the
security of www.we-are-secure.com. The company has provided the following information about
the infrastructure of its network:
·Network diagrams of the we-are-secure infrastructure
·Source code of the security tools
· IP addressing information of the we-are-secure network
Which of the following testing methodologies is we-are-secure.com using to test the security of its
network?
A.
Whitebox
B.
Blackbox
C.
Graybox
D.
Alpha testing
Explanation: