Multiple Choice
An information security professional with authorization to attempt to gain system access in an effort to identify and recommend resolutions for vulnerabilities in those systems is known as a(n) ____________.
A) penetration tester
B) gray-hat hacker
C) script kiddie
D) zebra team
Correct Answer:

Verified
Correct Answer:
Verified
Q35: Which of the following should be included
Q36: A project manager who understands project management,personnel
Q37: Which of the following is a key
Q38: The impetus to begin an SDLC-based project
Q39: Which of the following is an information
Q41: When using theGoverningfor Enterprise Security (GES)program,anEnterprise Security
Q42: How does tactical planning differ from strategic
Q43: A top-down approach to information security usually
Q44: According to the Corporate Governance Task Force
Q45: An example of a stakeholder of a