Mason4332 Mason4332 08-02-2024 Computers and Technology contestada A more active method of finding security holes that includes using the kinds of tools attackers use to mimic an attack on our environment A) Penetration testing B) Vulnerability scanning C) Exploitation testing D) Intrusion simulation