1.

Which of the following is not a proper use of RE for ethical hackers?

A. Check for poorly designed protocols
B. Check for error conditions
C. Cracking for making paid apps free for use
D. Testing for boundary conditions
Answer» D. Testing for boundary conditions


Discussion

No Comment Found