A company uses a cloud provider with shared network bandwidth to host a web application on dedicated servers. The company's contact with the cloud provider prevents any activities that would interfere with the cloud provider's other customers. When engaging with a penetration-testing company to test the application, which of the following should the company avoid?
- Crawling the web application's URLs looking for vulnerabilities
- Fingerprinting all the IP addresses of the application's servers
- Brute forcing the application's passwords
- Sending many web requests per second to test DDoS protection
Reveal Solution Next Question