CySA+ CS0-001 – Q. 416

3
809

Which of the following is the use of tools to simulate the ability for an attacker to gain access to a specified network?

A. Reverse engineering
B. Fuzzing
C. Penetration testing
D. Network mapping

3 COMMENTS