Which of the following would Jane, a security administrator, take advantage of to bypass security controls and gain unauthorized remote access into an organization?

Which of the following would Jane, a security administrator, take advantage of to bypass security controls and gain unauthorized remote access into an organization?






A. Vulnerability scan

B. Dumpster diving

C. Virtualization

D. Penetration test





Answer: D


Computer Science

Learn More Multiple Choice Question :