Testing an organization's security is known as ________ testing

a. Penetration
b. Location
c. Virus
d. None of the above

Answer A. This is also called white hat hacking.

Computer Science & Information Technology

You might also like to view...

One of the most widely known cryptographic algorithms is the ____________________, which was developed by IBM and is based on the company's Lucifer algorithm.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Briefly describe each of the following: CATV, DSL, ISDN, FTTP, T-carrier, and ATM.

What will be an ideal response?

Computer Science & Information Technology