Answer:
c. Conduct a penetration test
Step-by-step explanation:
To check for exploitable vulnerabilities, a penetration test, also known as a pen test, is a virtual cyber attack against your computer system.
Penetration testing is widely used to increase a web application firewall (WAF) in the sense of security for web applications.
Pen testing may include attempting to breach any number of application systems to identify vulnerabilities, such as unauthenticated inputs vulnerable to code injection attacks.