Multiple Choice
Intentionally attempting to circumvent IT system access controls to determine whether there are weaknesses in any controls is called:
A) Penetration testing
B) Intrusion detection
C) Integrity testing
D) Vulnerability testing
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q5: The careful oversight of cash balances, forecasted
Q6: The date that is the end of
Q7: Each category of processes in the typical
Q8: In order to help safeguard the availability
Q9: It is important that documentation support or
Q11: The textbook referred to the three primary
Q12: This type of system matching takes place
Q13: In a system of proper internal controls,
Q14: This type of software alerts the organization
Q15: The document that identifies the items being