________________ simulates an attack by a malicious party.
(a) Security Audit
(b) Vulnerability Scan
(c) Vulnerability Assessment
(d) Penetration Test
This question was addressed to me during an interview for a job.
I'm obligated to ask this question of Writing Testable Code in portion Test Coverage and Development of JUnit