Which of the following assessments would Pete, the security administrator, use to actively test that an application’s security controls are in place?
Which of the following would be used to identify the security posture of a network without actually exploiting any weaknesses?
Which of the following incident response procedures would he need to perform in order to begin the analysis?