An important consideration when performing a remote vulnerability test of a cloud-based application is to
Obtain provider permission for test
Use techniques to evade cloud provider’s detection systems
Use application layer testing tools exclusively
Use network layer testing tools exclusively
Schedule vulnerability test at night
Submit