As pan or a penetration lest, your team is tasked with discovering vulnerabilities that could be exploited from an inside threat vector. Which of the following activities fall within that scope?
A.
SQL injection attacks against the hr intranet website.
B.
A competitor's employee's scanning the company's website.
C.
Wireless "war driving" the company manufacturing site.
D.
Running a Nessus scan from the sales department network.
Chosen Answer:
This is a voting comment (?). You can switch to a simple comment. It is better to Upvote an existing comment if you don't have anything to add.
Submit