Security MCQ
Network Security
Which of the following would Jane, a security administrator, take advantage of to bypass security controls and gain unauthorized remote access into an organization?
Which of the following would Jane, a security administrator, take advantage of to bypass security controls and gain unauthorized remote access into an organization?
Which of the following would Jane, a security administrator, take advantage of to bypass security controls and gain unauthorized remote access into an organization?
A. Vulnerability scan
B. Dumpster diving
C. Virtualization
D. Penetration test
Answer: D
Learn More :