1.

Which of the following is not a proper use of RE for ethical hackers?(a) Check for poorly designed protocols(b) Check for error conditions(c) Cracking for making paid apps free for use(d) Testing for boundary conditionsI had been asked this question during an interview.This is a very interesting question from Attack Vectors topic in chapter Understanding Attack Vectors of Cyber Security

Answer»

Correct choice is (c) Cracking for making paid apps FREE for use

To EXPLAIN: Cracking for making paid apps free for use is not an acceptable REVERSE engineering work for ethical hackers. This PROCESS involves how the system or the application works internally and how to change the logic to crack the system or APP.



Discussion

No Comment Found

Related InterviewSolutions