CompTIA Network+ N10-008 Practice Question
An organization is evaluating its network security posture. As part of a threat assessment, which of the following activities would BEST help the organization identify a potential attacker's ability to exploit a publicly disclosed software vulnerability, assuming the attacker's perspective?
Auditing user rights and permissions
Reviewing security policies and documentation
Performing a vulnerability assessment
Conducting a penetration test