Question 47:
In which of the following testing methodologies do assessors use all available documentation and work under no constraints, and attempt to circumvent the security features of an information system?
Answer options:
A. Full operational test B. Walk-through test C. Penetration test D. Paper test