Watch this video on YouTube
Which cyber-security assessment technique involves simulating real-world cyber-attacks to test an organization's defenses and response capabilities?