The process of attempting to exploit a weakness in a network after being given permission by the company is known as:

Last Updated on August 7, 2021 by Admin 2

The process of attempting to exploit a weakness in a network after being given permission by the company is known as:

  • penetration testing
  • vulnerability scanning
  • reconnaissance
  • social engineering
0 0 votes
Article Rating
Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments