Which of the following best describes a set of security tests and evaluations that simulate attacks by a hacker or other malicious external source?
a. forensics
b. difference analysis
c. penetration testing
d. vulnerability assessment