Documentation, log, system configuration, ruleset, network sniffing, file integrity -the correct answer is a). answer b) does not have ruleset and c) has personnel review, which in large companies (which are the ones with the most need for penetration testing) would be unrealistic. documentation review evaluates policies and certain procedures for precision and soundness in the technical part of the system.the log review provides the history of the system (who has used it, configured it, modified it etc and when). the ruleset review reveals any holes that might exist in the rule-set security controls. system configuration, reviews how well has the system been configured, based on if there is any improvement that can be made, or if they have been configured with the proper policy. network sniffing monitors the traffic over the network. finally, file integrity checking identifies any changes made to important files.