InterviewSolution
Saved Bookmarks
| 1. |
Which of the following is not a proper use of RE for ethical hackers?(a) Check for poorly designed protocols(b) Check for error conditions(c) Cracking for making paid apps free for use(d) Testing for boundary conditionsI had been asked this question during an interview.This is a very interesting question from Attack Vectors topic in chapter Understanding Attack Vectors of Cyber Security |
|
Answer» Correct choice is (c) Cracking for making paid apps FREE for use |
|