Which of the following would be used to prove the existence of vulnerabilities on a network?

Which of the following would be used to prove the existence of vulnerabilities on a network?
A . Penetration testing
B . Vulnerability assessment
C . Business impact analysis
D . Risk assessment

Answer: A

Latest CV0-001 Dumps Valid Version with 565 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments