Why should authorization be obtained for penetration testing and vulnerability testing?
What will be an ideal response?
A penetration or vulnerability test is an attempt to break into a computer network. Because computer crime can carry severe penalties, a tester should have written and signed authority to conduct these tests. Penetration testing may result in disruption or even damage to data, or a third party may want to file a claim against the tester (such as a tester of a hospital system who corrupts patient information). Having prior authorization can help limit these risks. Although not common, there have been instances of penetration testers who have been successful in entering computer networks only to have technical support personnel "turn the tables" and instigate a retaliation attack against the tester.
You might also like to view...
In a database, each ____________ holds a collection of related data items.
a. spreadsheet b. record c. table d. object
What is the purpose of the kernel?
What will be an ideal response?
In the Windows 10 CLI, if you omit the path in the TREE command, the command displays an error message.
Answer the following statement true (T) or false (F)
List four standard operations that can be performed by the LDAP protocol.
What will be an ideal response?