Jude, a pen tester, examined a network from a hacker's perspective to identify exploits and vulnerabilities accessible to the outside world by using devices such as firewalls, routers, and servers. In this process, he also estimated the threat of network security attacks and determined the level of security of the corporate network.
What is the type of vulnerability assessment that Jude performed on the organization?
A. Application assessment
B. External assessment
C. Passive assessment
D. Host-based assessment
What is the type of vulnerability assessment that Jude performed on the organization?
A. Application assessment
B. External assessment
C. Passive assessment
D. Host-based assessment