List of questions
Related questions
Question 420 - N10-008 discussion
Which of the following describes when an active exploit is used to gain access to a network?
A.
Penetration testing
B.
Vulnerability testing
C.
Risk assessment
D.
Posture assessment
E.
Baseline testing
Your answer:
0 comments
Sorted by
Leave a comment first