39. Which of the following is a procedure designed to test and perhaps bypass a system's security controls?
(A) Logging usage data
(B) War dialing
(C) Penetration testing
(D) Deploying secured desktop workstations
答案:登入後查看
統計: A(0), B(0), C(1), D(0), E(0) #3560428
統計: A(0), B(0), C(1), D(0), E(0) #3560428