Which of the following techniques should the IT department employ to evaluate security mechanisms and identify areas lacking sufficient protection?
a) Penetration testing
b) Software development
c) Data analysis
d) Graphic design