. "If access is achieved, the vulnerability should be corrected and the penetration test re-performed until the test is clean and no longer allows unauthorizedaccess or other malicious activity.ComponentsConsider including all of these penetration-testing techniques (as well as others) in the methodology, such as social engineering and the exploitation of exposed vulnerabilities, access controls on k" . . .