Which of the following is used to purposely attack a system to exploit vulnerabilities?
A. Honeypot
B. Vulnerability scan
C. Device hardening
D. Penetration testing
Exam N10-008: CompTIA Network+Free dumps for N10-008 in PDF format.High quality N10-008 PDF and software. VALID exam to help you pass. |