What is the name of the risk assessment stage in which you bypass login accounts and passwords?
A.
Penetration
B.
Control
C.
Activation
D.
Discovery
Explanation:
In Penetration, all access controls (including login accounts and passwords) are bypassed.
Incorrect Answers:
B: Control is the stage where you show that you can control the resource, and show the methods that can be used to ensure prevention.
C: Activation is not a risk assessment stage.
D: Discovery is the task of testing the network security for effectiveness and locating weaknesses.