Penetration testing is often referred to as ____.
A. ethical hacking
B. blackhat hacking
C. ethical testing
D. social engineering
Answer: A
You might also like to view...
All data and instructions that go into a computer, processed by it, and come out of it are represented as binary numbers signaling only two states: on and off.
a. true b. false
Under the fair credit reporting act a person can obtain a copy of their report from any of the reporting agencies -- at no charge -- under which of the following circumstances?
a. A credit report is always free. b. There is always a charge for credit reports, regardless of the circumstances. c. Any time the person is the victim of an adverse action taken as a result of their credit report. d. If the person applies for and is granted an exemption from charges by the Federal Credit Control Agency.