View all questions & answers for the GSEC exam
Validating which vulnerabilities in a network environment are able to be exploited by an attacker is called what?
Anomaly detection
Vulnerability scanning
Perimeter assessment
Penetration testing
Submit