Question 85:
The process of attempting to exploit a weakness in a network after being given permission by the company is known as:
Answer options:
A. penetration testing B. vulnerability scanning C. reconnaissance D. social engineering
Answer correct:
A