#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

________________ are intended to find exploitable flaws in a company's data network.

Answer

Penetration Test