1.

________________ simulates an attack by a malicious party.

A. security audit
B. vulnerability scan
C. vulnerability assessment
D. penetration test
Answer» E.


Discussion

No Comment Found