A more active method of finding security holes that includes using the kinds of tools attackers use to mimic an attack on our environment
A) Penetration testing
B) Vulnerability scanning
C) Exploitation testing
D) Intrusion simulation