When a security professional is presented with a contract drawn up by a company's legal department, which allows them to "hack" the company's network, they should proceed by performing what precautionary step?

A. consult the company's lawyer
B. consult their lawyer
C. sign the contract
D. begin testing immediately

Answer: B

Computer Science & Information Technology

You might also like to view...

The style guides suggest the use of a sans serif font

Indicate whether the statement is true or false

Computer Science & Information Technology

The ____ in an 802.1x configuration stores the list of the names and credentials of authorized users to verify their authenticity.

A. supplicant B. authenticator C. authentication server D. RADIUS

Computer Science & Information Technology