A penetration tester is which of the following?

a. A person who accesses a computer or network without permission from the owner
b. A person who uses telephone services without payment
c. A security professional who's hired to hack into a network to discover vulnerabilities
d. A hacker who accesses a system without permission but does not delete or destroy files


Answer: c. A security professional who's hired to hack into a network to discover vulnerabilities

Computer Science & Information Technology

You might also like to view...

The Auto Tab property applies only to a text box control

Indicate whether the statement is true or false

Computer Science & Information Technology

C provides the four functions, malloc(), calloc(), realloc(), and free() to control the dynamic allocation and release of memory space.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

A good patch cable should include a _______________.

A. boot B. clip C. buckle D. clasp

Computer Science & Information Technology

A(n) ____________________ script is a set of instructions written in a programming language and designed to accept data from and return data to a Web page visitor.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology