Understanding of the different types of testing (blackbox, whitebox, etc) and their relative advantages and disadvantages
Can demonstrate the mapping of a network using a range of tools, such as traceroute, traceroute and ping, and by querying active searches, such as DNS and SNMP servers
Understands the security implications of shared media and can exploit its vulnerabilities during a penetration test
Can assess and exploit vulnerabilities within the functional logic, function access control and business logic of an application