cc video for organization A has hired a third party to perform a security test for them. The third-party vendor has been given no special knowledge of the
Organization A has hired a third party to perform a security test for them. The third-party vendor has been given no special knowledge of the environment. Instead, they are to use the same techniques, toolsets, and methodologies that an actual attacker would use to try to actively attempt to attack and compromise Organization A's application. What type of test is being described here?