Question: In network security, penetration testing normally evaluates a system's ability to protect its networks, applications, endpoints and users from external or internal threats. It also
In network security, penetration testing normally evaluates a system's ability to protect its networks, applications, endpoints and users from external or internal threats. It also attempts to protect the security controls and ensures only authorized access . What /which tools would you authorize your team to deploy and use, for what reasons , and on what resources (top secret systems , general use systems (like marketing , etc), sensitive but not classified systems , all systems, etc)?
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
