I remember practicing a question about VRF instances, and I think they are primarily found in service provider environments, so maybe it's the routers in the core?
This question seems pretty straightforward. I think the key is understanding the importance of having a legal agreement in place before conducting a penetration test.
Oof, this is a tough call. I can see the appeal of just plowing ahead and ignoring the stakeholder, but that could really backfire. And escalating to management might just make things worse. I think the best bet is to try and have an open and honest conversation with the stakeholder. Gotta keep those lines of communication clear.
upvoted 0
times
...
Log in to Pass4Success
Sign in:
Report Comment
Is the comment made by USERNAME spam or abusive?
Commenting
In order to participate in the comments you need to be logged-in.
You can sign-up or
login
Lucy
6 months agoCarmen
6 months agoVallie
6 months agoShawn
6 months agoLucina
6 months agoCarissa
6 months agoLajuana
6 months agoLorrie
6 months agoYoko
7 months agoLeanna
7 months agoKatina
7 months ago