Final answer:
Unauthorized attempts by internal or external parties to test an organization's information system are known as penetration testing, which is authorized and differs from malicious cyber attacks.
Step-by-step explanation:
An unauthorized attempt by an internal audit team or an external security consultant to break into an organization's information system is called b. Penetration testing. Penetration testing is a proactive and authorized process to evaluate the security of an information system by simulating an attack from malicious outsiders (hackers) or insiders (employees with access). Unlike a cyber attack, which is malicious and unauthorized, penetration testing is done with permission to assess the system's defenses and identify vulnerabilities that need to be fixed.