Which of the following would be used to prove the existence of vulnerabilities on a network?
A . Penetration testing
B . Vulnerability assessment
C . Business impact analysis
D . Risk assessment
Answer: A
Latest CV0-001 Dumps Valid Version with 565 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund