You will be responsible for providing a penetration test of the scope identified and provided to you by the "client" and their team.  This scope may consist of a number of machines on different subnets, depending on what access is authorized by for your test.