header bg

Scan QR code or get instant email to install app

Question:

When an attacker has partial knowledge of inner-workings of the application, what type of analysis is performed?

A Grey-box
explanation

Related Information

Comments

Leave a Reply

Your email address will not be published. Required fields are marked *

*