Which of the following SSA audit types involves simulating real-life attacker in the unprivileged and privileged modes?
Select the correct option from below list
1. Process Audits
2. Process Maturity Review
3. Technical Review