Which of the following best practices is used to identify areas in the network that may be vulnerable to penetration testing from known external sources?
A. Blue team training exercises
B. Technical control reviews
C. White team training exercises
D. Operational control reviews