The company CIO wants you and your team to check the security of the network by simulating an attack by malicious individuals. He is asking you to Select one:
a. Do something illegal
b. Conduct a vulnerability assessment
c. Conduct a penetration test
d. Perform a risk assessment

Respuesta :

Answer:

c. Conduct a penetration test

Explanation:

To check for exploitable vulnerabilities, a penetration test, also known as a pen test, is a virtual cyber attack against your computer system.

Penetration testing is widely used to increase a web application firewall (WAF) in the sense of security for web applications.

Pen testing may include attempting to breach any number of application systems to identify vulnerabilities, such as unauthenticated inputs vulnerable to code injection attacks.

RELAXING NOICE
Relax