Exploitation of security vulnerabilities is used during assessments when which of the following is true?

Exploitation of security vulnerabilities is used during assessments when which of the following is true?








A. Security testers have clear and written authorization to conduct vulnerability scans.
B. Security testers are trying to document vulnerabilities without impacting network operations.
C. Network users have permissions allowing access to network devices with security weaknesses.
D. Security testers have clear and written authorization to conduct penetration testing.







Answer: D


Computer Science

Learn More Multiple Choice Question :