A company hires a cybersecurity consultant to assess vulnerability on crucial web application devices such as web and database servers. Which document should the company provide to help the consultant document and define what systems are in the testing?
- examples of application requests
- source codes of the applications
- system and network architectural diagram
- software development kit (SDK) for specific applications
Explanation & Hint: The system and network architectural diagrams can be very beneficial for penetration testers to help them to document and define what systems are in scope during the testing. |