Problem
Consider planning an approach to testing all assets of a client. Does it really matter if the client uses mobile devices, the cloud, or wireless infrastructure? From the point of view of a penetration tester, what additional tests would you perform if you thought the client used any of these devices or services?