Que: _____________ is the technique used in business organizations and firms to protect IT assets. a. Ethical hacking b. Unethical hacking c. Fixing bugs d. Internal data-breach Answer: Ethical hacking