Q. ________________ simulates an attack by a malicious party. (Solved)
1. security audit
2. vulnerability scan
3. vulnerability assessment
4. penetration test
- d. penetration test
1. security audit
2. vulnerability scan
3. vulnerability assessment
4. penetration test