a. To think like hackers and know how to defend such attacks |
b. To hack a system without the permission |
c. To hack a network that is vulnerable |
d. To corrupt software or service using malware |
Answer: To think like hackers and know how to defend such attacks |