I remember practicing a question about VRF instances, and I think they are primarily found in service provider environments, so maybe it's the routers in the core?
This question seems pretty straightforward. I think the key is understanding the importance of having a legal agreement in place before conducting a penetration test.
Oof, this is a tough call. I can see the appeal of just plowing ahead and ignoring the stakeholder, but that could really backfire. And escalating to management might just make things worse. I think the best bet is to try and have an open and honest conversation with the stakeholder. Gotta keep those lines of communication clear.
upvoted 0 times
...
Log in to Pass4Success
Sign in:
Report Comment
Is the comment made by USERNAME spam or abusive?
Commenting
In order to participate in the comments you need to be logged-in.
You can sign-up or
login
Lucy
4 months agoCarmen
4 months agoVallie
4 months agoShawn
4 months agoLucina
5 months agoCarissa
5 months agoLajuana
5 months agoLorrie
5 months agoYoko
5 months agoLeanna
5 months agoKatina
5 months ago