Certified Authorization Professional – CAP – Question122

In which of the following testing methodologies do assessors use all available documentation and work under no constraints, and attempt to circumvent the security features of an information system?

A.
Full operational test
B. Penetration test
C. Paper test
D. Walk-through test

Correct Answer: B