Which of the following best practices is used to identify areas in the network that may be vulnerable to penetration testing from known external sources?

Which of the following best practices is used to identify areas in the network that may be vulnerable to penetration testing from known external sources?
A . Blue team training exercises
B . Technical control reviews
C . White team training exercises
D . Operational control reviews

Answer: A

Latest CS0-001 Dumps Valid Version with 455 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments