in Education by
After performing ____________ the ethical hacker should never disclose client information to other parties. (a) hacking (b) cracking (c) penetration testing (d) exploiting I have been asked this question in a national level competition. My question comes from Ethics of Ethical Hacking in chapter Security Ethics, Security Breach Scenarios & Corporate Security of Cyber Security Select the correct answer from above options Cyber Security questions and answers, Cyber Security questions pdf, Cyber Security question bank, Cyber Security questions and answers pdf, mcq on Cyber Security pdf,

1 Answer

0 votes
by
 
Best answer
Right option is (c) penetration testing To explain: It is against the laws and ethics of ethical hackers that after doing penetration tests, the ethical hacker should never disclose client information to other parties. The protection of client data is in the hands of the ethical hacker who performed the tests.

Related questions

0 votes
    An ethical hacker must ensure that proprietary information of the firm does not get leaked. (a) True (b) False ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 3, 2021 in Education by JackTerrance
0 votes
    Performing a shoulder surfing in order to check other's password is ____________ ethical practice. (a) a good (b) ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 3, 2021 in Education by JackTerrance
0 votes
    ____________ is the information gathering phase in ethical hacking from the target user. (a) Reconnaissance (b) Scanning ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 5, 2021 in Education by JackTerrance
0 votes
    An ethical hacker must need to have the skills of understanding the problem, networking knowledge and to know how the ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
    ____________ is a tiny script that if uploaded to a web server can give hacker complete control of a remote ... for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Oct 31, 2021 in Education by JackTerrance
0 votes
    _______________ attacks always need physical access to the system that is having password file or the hacker ... Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Nov 1, 2021 in Education by JackTerrance
0 votes
    Creators of _____________ also sell your browsing behaviour & information to 3^rd parties. (a) Shareware (b ... for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Oct 31, 2021 in Education by JackTerrance
0 votes
    Creators of adware also sell your browsing behaviour & information to 3^rd parties. (a) True (b) False ... -for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Oct 31, 2021 in Education by JackTerrance
0 votes
    Which of the following comes after scanning phase in ethical hacking? (a) Scanning (b) Maintaining access (c) ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 5, 2021 in Education by JackTerrance
0 votes
0 votes
    A ____________ takes over your system's browser settings and the attack will redirect the websites you visit some other ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 3, 2021 in Education by JackTerrance
...