Que: _____________ is the technique used in business organizations and firms to protect IT assets.

a. Ethical hacking
b. Unethical hacking
c. Fixing bugs
d. Internal data-breach
Answer: Ethical hacking

Leave a Comment