CompTIA CySA+ CS0-003 Practice Question
An organization wants to identify vulnerabilities that could be exploited by attackers from outside its network. Which method is MOST appropriate for achieving this goal?
Passive network monitoring
External vulnerability scanning
Penetration testing
Internal vulnerability scanning