Giving network access to a bad actor for the purposes of testing.
Assessing computers, computer systems, networks, or applications for weaknesses.
Attempting to break into a system or network for the purpose of verifying the systems in place.
Attempting to gather credentials with phishing emails.
35. Consider the following scenario:
A co-worker needs to share a sensitive file with you, but it is too large to send via an encrypted email. The co-worker works out of a remote office. You work at headquarters. Which of these options would most likely be approved by the company’s security policies? Select all that apply.