ethical-hacker video for jane, a pen tester, examined a network from a hacker's perspective to identify exploits and vulnerabilities accessible to the outside
Jane, a pen tester, examined a network from a hacker's perspective to identify exploits and vulnerabilities accessible to the outside world by using devices such as firewalls, routers, and servers. In this process, she also estimated the threat of network security attacks and determined the level of security of the corporate network. What is the type of vulnerability assessment that Jane performed on the organization?