39. Which of the following is a procedure designed to test and perhaps bypass a system's security controls?
(A) Logging usage data
(B) War dialing
(C) Penetration testing
(D) Deploying secured desktop workstations
詳解 (共 1 筆)
未解鎖
題目解析 本題問的是哪一種程序旨在測試...