When a security professional is presented with a contract drawn up by a company's legal department, which allows them to "hack" the company's network, they should proceed by performing what precautionary step?
A. consult the company's lawyer
B. consult their lawyer
C. sign the contract
D. begin testing immediately
Answer: B
Computer Science & Information Technology
You might also like to view...
The style guides suggest the use of a sans serif font
Indicate whether the statement is true or false
Computer Science & Information Technology
The ____ in an 802.1x configuration stores the list of the names and credentials of authorized users to verify their authenticity.
A. supplicant B. authenticator C. authentication server D. RADIUS
Computer Science & Information Technology