Exam Premium

CompTIA exam questions

☰
  • CompTIA A+ Core 1
  • CompTIA A+ Core 2
  • CompTIA Network+
  • CompTIA Security+
  • CompTIA CASP+

CompTIA Network+ Question B-87


The process of attempting to exploit a weakness in a network after being given permission by the company is known as:

A. penetration testing
B. vulnerability scanning
C. reconnaissance
D. social engineering

Correct Answer: A
Tagged with 
Penetration test penetration testing reconnaissance Social Engineering Vulnerability scan vulnerability scanning
 

Post navigation

Previous Post« Previous CompTIA Network+ Question B-86
Next Post CompTIA Network+ Question B-88Next »
Affiliated Sites
  • PMP Exam Questions
  • Cisco CCNA Exam Questions
  • CompTIA A+ Core 1
  • CompTIA A+ Core 2
  • CompTIA Network+
  • CompTIA Security+
  • CompTIA CASP+
Copyright © 2025 Exam Premium
×Close