To operate effectively, the ethical hacker must be:
A.Informed of the assets to be protected
B. Informed of potential threat sources
To operate effectively, the ethical hacker must be:
A.Informed of the assets to be protected
B. Informed of potential threat sources