GIAC GSLC Question Answer
Maria works as a professional Ethical Hacker. She recently has been assigned a project to test the security of www.we-are-secure.com. The company has provided the following information about the infrastructure of its network:
• Network diagrams of the we-are-secure infrastructure
• Source code of the security tools
• IP addressing information of the we-are-secure network
Which of the following testing methodologies is we-are-secure.com using to test the security of its network?