In which of the following testing methodologies do assessors use all available
documentation and work under no constraints, and attempt to circumvent the security
features of an information system?
A.
Full operational test
B.
Walk-through test
C.
Penetration test
D.
Paper test