Multiple Choice
__________, a level beyond vulnerability testing, is a set of security tests and evaluations that simulate attacks by a malicious external source (hacker) .
A) Penetration testing
B) Penetration simulation
C) Attack simulation
D) Attack testing
Correct Answer:

Verified
Correct Answer:
Verified
Q13: Inventory characteristics for hardware and software assets that
Q14: An effective information security governance program requires
Q15: The _ is a statement of the
Q16: A general guideline for performance of hard
Q17: An attacker's use of a laptop while
Q19: The NIST SP 800-100 Information Security Handbook provides<u> technical</u>
Q20: List the four steps to developing a
Q21: The _ tester's ultimate responsibility is to
Q22: As the help desk personnel screen problems,
Q23: The primary goal of the <u>external </u>monitoring