"Testing the network using the same methodologies and tools employed by attackers" Identify the correct terminology that defines the above statement.