An information security professional with authorization to attempt to gain system access in an effort to identify and recommend resolutions for vulnerabilities in those systems is known as a(n) __________.

A. penetration tester
B. expert hacker
C. phreaker
D. cracker


Answer: A

Computer Science & Information Technology

You might also like to view...

The difference between the operator! member function and the operator void* member function is that:

a. They always return opposite boolean values. b. They occasionally return opposite boolean values. c. Of the two member functions, only operator! checks if eof has been set. d. Of the two member functions, only operator void* checks if eof has been set.

Computer Science & Information Technology

Which of the following buttons should you click to open the File New Database dialog box?

A.
B.
C.
D.

Computer Science & Information Technology

Method __________ registers a stateChanged event handler with a component.

a) addChangeListener b) addActionListener c) addKeyListener d) addStateListener

Computer Science & Information Technology

A shortcut trust relationship exists within a single forest

Indicate whether the statement is true or false

Computer Science & Information Technology