The testing attempts to violate those procedures, which should test the adequacy of the
security procedures.
A. Disaster testing
B. Functional testing
C. Regression testing
D. Compliance testing
security procedures.
A. Disaster testing
B. Functional testing
C. Regression testing
D. Compliance testing