A Security professional may think they are following the requirements set forth by the client who hired them to perform a security test, don't assume that management will be happy with the test results. Provide an example of an ethical hacking situation that might upset a manager.

What will be an ideal response?


One tester was reprimanded by a manager who was upset that the security testing revealed all the user names and passwords to the tester. The manager believed that the tester shouldn't know this information and considered stopping the security testing.

Computer Science & Information Technology

You might also like to view...

You can only use the paste command in PowerShell ISE to place text from the edit buffer after first using the Cut or Copy command.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

A chart that combines two or more chart types into a single graph is called a(n) ____________________ chart.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

The opposite of asymmetric encryption is ____ encryption, in which one key is used to encrypt and decrypt.?

A. ?available key B. ?asymmetric key C. ?symmetric D. ?public key

Computer Science & Information Technology

When you click a type tool cursor on text and apply the Select All command, the text and all objects on the artboard are selected.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology