Penetration testing is often referred to as ____.

A. ethical hacking
B. blackhat hacking
C. ethical testing
D. social engineering

Answer: A

Computer Science & Information Technology

You might also like to view...

All data and instructions that go into a computer, processed by it, and come out of it are represented as binary numbers signaling only two states: on and off.

a. true b. false

Computer Science & Information Technology

Under the fair credit reporting act a person can obtain a copy of their report from any of the reporting agencies -- at no charge -- under which of the following circumstances?

a. A credit report is always free. b. There is always a charge for credit reports, regardless of the circumstances. c. Any time the person is the victim of an adverse action taken as a result of their credit report. d. If the person applies for and is granted an exemption from charges by the Federal Credit Control Agency.

Computer Science & Information Technology