Which of the following security operations is used for determining the attack surface of an organization?
If there is an Intrusion Detection System (IDS) in intranet, which port scanning technique cannot be used?
Due to a slowdown of normal network operations, IT department decided to monitor internet traffic for all of the employees. From a legal stand point, what would be troublesome to take this kind of measure?
To determine if a software program properly handles a wide range of invalid input, a form of automated testing can be used to randomly generate invalid input in an attempt to crash the program.
What term is commonly used when referring to this type of testing?