Which of the following is NOT a technique used for network security assessment?
Vulnerability scanning
Social engineering
Log analysis
Penetration testing

Cybersecurity and Ethical Hacking Exercises are loading ...