Which of the following is the use of tools to simulate the ability for an attacker to gain access to a specified network?
A. Reverse engineering
B. Fuzzing
C. Penetration testing
D. Network mapping
Which of the following is the use of tools to simulate the ability for an attacker to gain access to a specified network?
A. Reverse engineering
B. Fuzzing
C. Penetration testing
D. Network mapping
14. Which of the following defines the components of a penetration test?
a. Executive summary
b. After-action report
c. Rules of engagement
d. Confidentiality agreement.
I would say c. Rules of engagement