Which of the following would Jane, a security administrator, take advantage of to bypass security controls and gain unauthorized remote access into an organization?

Which of the following would Jane, a security administrator, take advantage of to bypass security controls and gain unauthorized remote access into an organization?



A. Vulnerability scan

B. Dumpster diving

C. Virtualization

D. Penetration test




Answer: D


Learn More :

Network Security

Learn More Multiple Choice Question :