Which ethical hacking technique involves replicating a cyberattack to identify weaknesses in a computer network?
Penetration testing
Risk analysis
Social engineering
Vulnerability assessment

Network Ethical Hacking Exercises are loading ...