What distinguishes the ethical hacker from the “cracker” if two hackers attempt to break the network resource security of a company and one is regarded as an ethical hacker, whereas the other is not?
A
The ethical hacker always obtains written permission before testing.
explanation
Before testing, the ethical hacker always obtains written permission and never conducts a test without it!
Comments