An enterprise has hired an outside security firm to conduct penetration testing on its network and applications.
The firm has been given the documentation only available to the customers of the applications. Which of the
following BEST represents the type of testing that will occur?
A. Bug bounty
B. Black-box
C. Gray-box
D. White-box
The firm has been given the documentation only available to the customers of the applications. Which of the
following BEST represents the type of testing that will occur?
A. Bug bounty
B. Black-box
C. Gray-box
D. White-box