Computer Science, asked by layaprada4416, 10 months ago

A pen testing method in which a tester with access to an application behind its firewall imitates an attack that could be caused by a malicious insider.

Answers

Answered by neethu523
11

Answer:

Not Dynamic Analysis

Explanation:

Similar questions