When a security professional is presented with a contract drawn up by a company's legal department, which allows them to "hack" the company's network, they should proceed by performing what precautionary step?

A. consult the company's lawyer
B. consult their lawyer
C. sign the contract
D. begin testing immediately


Answer: B

Computer Science & Information Technology

You might also like to view...

NumberFormat method ________ returns a String representation of its argument in the specified numeric format.

a. number b. toNumeric c. format d. numeric

Computer Science & Information Technology

________ is the closeness of agreement between the result of a measurement and the true value of the measured.

A) Precision B) Sensor C) Accuracy D) Resolution

Computer Science & Information Technology

?In Microsoft Edge, you can switch to Reading View, which __________. 

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Phishing schemes may use a technique called ____, which is setting up spoofed Web sites with addresses slightly different from legitimate sites.

A. typosquatting B. spamming C. DoS attacks D. identity theft

Computer Science & Information Technology