faithatkinson2063 faithatkinson2063 08-02-2024 Computers and Technology contestada Which of the following describes when an active exploit is used to gain access to a network? A. Penetration testing B. Vulnerability testing C. Risk assessment D. Posture assessment E. Baseline testing