Testing an organization's security is known as ________ testing
a. Penetration
b. Location
c. Virus
d. None of the above
Answer A. This is also called white hat hacking.
Computer Science & Information Technology
You might also like to view...
One of the most widely known cryptographic algorithms is the ____________________, which was developed by IBM and is based on the company's Lucifer algorithm.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
Briefly describe each of the following: CATV, DSL, ISDN, FTTP, T-carrier, and ATM.
What will be an ideal response?
Computer Science & Information Technology