A company wants to assess the effectiveness of its security measures by simulating an attack on its network. Which type of assessment would BEST satisfy this requirement?
Reviewing security policies and procedures
Conducting a penetration test
Conducting a vulnerability assessment
Performing a security audit