In which of the following testing methodologies do assessors use all available documentation and work under no constraints, and attempt to circumvent the security features of an information system?
A . Full operational test
B . Walk-through test
C . Penetration test
D . Paper test
Answer: C
Latest CAP Dumps Valid Version with 395 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund