A penetration tester needs to provide the code used to exploit a DNS server in the final report. In which of the following parts of the report should the penetration tester place the code?
A. Executive summary
B. Remediation
C. Conclusion
D. Technical summary