A pen testing method in which a tester with access to an application behind its firewall imitates an attack that could be caused by a malicious insider.
Internal Testing
External Testing
Dynamic analysis
Static analysis
Answers
Answered by
0
Answer:
dynamic analysis is the right answer
Similar questions