SlideShare a Scribd company logo
In part, the ISC 2
Code of Ethics states which of the following?
A. Thou shalt not use a computer to harm other people.
B. Compromising the privacy of users is unethical.
C. All information should be free.
D. Act honorably, honestly, justly, responsibly, and legally
Solution
B. Ethical hackers use the same methods as crackers and black-hat hackers, but they report the
problems they find instead of taking advantage of them. Ethical hacking has other names, such as
penetration testing , intrusion testing , and red-teaming . Ethical hackers do not typically have
permission to destroy a network, can be held responsible if they exceed the limits of their
contracts, and can be jailed or prosecuted if they break laws or exceed their legal privilege.

More Related Content

More from rtodd101

More from rtodd101 (10)

In an aqueous solution of 0-020 M HCl under standard conditions (T-25.docx
In an aqueous solution of 0-020 M HCl under standard conditions (T-25.docxIn an aqueous solution of 0-020 M HCl under standard conditions (T-25.docx
In an aqueous solution of 0-020 M HCl under standard conditions (T-25.docx
 
In a survey of a TriDelt chapter with 50 members- 24 were taking math.docx
In a survey of a TriDelt chapter with 50 members- 24  were taking math.docxIn a survey of a TriDelt chapter with 50 members- 24  were taking math.docx
In a survey of a TriDelt chapter with 50 members- 24 were taking math.docx
 
In a preparation for a synthetic plant hormone I experiment- 1- Give a.docx
In a preparation for a synthetic plant hormone I experiment- 1- Give a.docxIn a preparation for a synthetic plant hormone I experiment- 1- Give a.docx
In a preparation for a synthetic plant hormone I experiment- 1- Give a.docx
 
In 2012 Tony invests $35-000 in an activity for which he is not a mate.docx
In 2012 Tony invests $35-000 in an activity for which he is not a mate.docxIn 2012 Tony invests $35-000 in an activity for which he is not a mate.docx
In 2012 Tony invests $35-000 in an activity for which he is not a mate.docx
 
In 1985 Ted Thomas took $6-000 of his savings- borrowed another $4-000 (2).docx
In 1985 Ted Thomas took $6-000 of his savings- borrowed another $4-000 (2).docxIn 1985 Ted Thomas took $6-000 of his savings- borrowed another $4-000 (2).docx
In 1985 Ted Thomas took $6-000 of his savings- borrowed another $4-000 (2).docx
 
In 1985 Ted Thomas took $6-000 of his savings- borrowed another $4-000.docx
In 1985 Ted Thomas took $6-000 of his savings- borrowed another $4-000.docxIn 1985 Ted Thomas took $6-000 of his savings- borrowed another $4-000.docx
In 1985 Ted Thomas took $6-000 of his savings- borrowed another $4-000.docx
 
In 1993 the 101st International Olympic Committee met in Monaco to sel.docx
In 1993 the 101st International Olympic Committee met in Monaco to sel.docxIn 1993 the 101st International Olympic Committee met in Monaco to sel.docx
In 1993 the 101st International Olympic Committee met in Monaco to sel.docx
 
Implement a Linked List as a subclass of the abstract List class- Make.docx
Implement a Linked List as a subclass of the abstract List class- Make.docxImplement a Linked List as a subclass of the abstract List class- Make.docx
Implement a Linked List as a subclass of the abstract List class- Make.docx
 
imagine a simple economy of freedonia that uses gold as its currency ( (1).docx
imagine a simple economy of freedonia that uses gold as its currency ( (1).docximagine a simple economy of freedonia that uses gold as its currency ( (1).docx
imagine a simple economy of freedonia that uses gold as its currency ( (1).docx
 
In 1985 Ted Thomas took $6-000 of his savings- borrowed another $4-000 (1).docx
In 1985 Ted Thomas took $6-000 of his savings- borrowed another $4-000 (1).docxIn 1985 Ted Thomas took $6-000 of his savings- borrowed another $4-000 (1).docx
In 1985 Ted Thomas took $6-000 of his savings- borrowed another $4-000 (1).docx
 

Recently uploaded

ppt your views.ppt your views of your college in your eyes
ppt your views.ppt your views of your college in your eyesppt your views.ppt your views of your college in your eyes
ppt your views.ppt your views of your college in your eyes
ashishpaul799
 
IATP How-to Foreign Travel May 2024.pdff
IATP How-to Foreign Travel May 2024.pdffIATP How-to Foreign Travel May 2024.pdff
IATP How-to Foreign Travel May 2024.pdff
17thcssbs2
 
Industrial Training Report- AKTU Industrial Training Report
Industrial Training Report- AKTU Industrial Training ReportIndustrial Training Report- AKTU Industrial Training Report
Industrial Training Report- AKTU Industrial Training Report
Avinash Rai
 
The basics of sentences session 4pptx.pptx
The basics of sentences session 4pptx.pptxThe basics of sentences session 4pptx.pptx
The basics of sentences session 4pptx.pptx
heathfieldcps1
 

Recently uploaded (20)

ppt your views.ppt your views of your college in your eyes
ppt your views.ppt your views of your college in your eyesppt your views.ppt your views of your college in your eyes
ppt your views.ppt your views of your college in your eyes
 
[GDSC YCCE] Build with AI Online Presentation
[GDSC YCCE] Build with AI Online Presentation[GDSC YCCE] Build with AI Online Presentation
[GDSC YCCE] Build with AI Online Presentation
 
Operations Management - Book1.p - Dr. Abdulfatah A. Salem
Operations Management - Book1.p  - Dr. Abdulfatah A. SalemOperations Management - Book1.p  - Dr. Abdulfatah A. Salem
Operations Management - Book1.p - Dr. Abdulfatah A. Salem
 
IATP How-to Foreign Travel May 2024.pdff
IATP How-to Foreign Travel May 2024.pdffIATP How-to Foreign Travel May 2024.pdff
IATP How-to Foreign Travel May 2024.pdff
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
 
The Benefits and Challenges of Open Educational Resources
The Benefits and Challenges of Open Educational ResourcesThe Benefits and Challenges of Open Educational Resources
The Benefits and Challenges of Open Educational Resources
 
Telling Your Story_ Simple Steps to Build Your Nonprofit's Brand Webinar.pdf
Telling Your Story_ Simple Steps to Build Your Nonprofit's Brand Webinar.pdfTelling Your Story_ Simple Steps to Build Your Nonprofit's Brand Webinar.pdf
Telling Your Story_ Simple Steps to Build Your Nonprofit's Brand Webinar.pdf
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
 
Open Educational Resources Primer PowerPoint
Open Educational Resources Primer PowerPointOpen Educational Resources Primer PowerPoint
Open Educational Resources Primer PowerPoint
 
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
 
Industrial Training Report- AKTU Industrial Training Report
Industrial Training Report- AKTU Industrial Training ReportIndustrial Training Report- AKTU Industrial Training Report
Industrial Training Report- AKTU Industrial Training Report
 
The basics of sentences session 4pptx.pptx
The basics of sentences session 4pptx.pptxThe basics of sentences session 4pptx.pptx
The basics of sentences session 4pptx.pptx
 
Salient features of Environment protection Act 1986.pptx
Salient features of Environment protection Act 1986.pptxSalient features of Environment protection Act 1986.pptx
Salient features of Environment protection Act 1986.pptx
 
2024_Student Session 2_ Set Plan Preparation.pptx
2024_Student Session 2_ Set Plan Preparation.pptx2024_Student Session 2_ Set Plan Preparation.pptx
2024_Student Session 2_ Set Plan Preparation.pptx
 
Benefits and Challenges of Using Open Educational Resources
Benefits and Challenges of Using Open Educational ResourcesBenefits and Challenges of Using Open Educational Resources
Benefits and Challenges of Using Open Educational Resources
 
B.ed spl. HI pdusu exam paper-2023-24.pdf
B.ed spl. HI pdusu exam paper-2023-24.pdfB.ed spl. HI pdusu exam paper-2023-24.pdf
B.ed spl. HI pdusu exam paper-2023-24.pdf
 
Jose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptx
Jose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptxJose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptx
Jose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptx
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
 

In part- the ISC2 Code of Ethics states which of the following- A- Tho.docx

  • 1. In part, the ISC 2 Code of Ethics states which of the following? A. Thou shalt not use a computer to harm other people. B. Compromising the privacy of users is unethical. C. All information should be free. D. Act honorably, honestly, justly, responsibly, and legally Solution B. Ethical hackers use the same methods as crackers and black-hat hackers, but they report the problems they find instead of taking advantage of them. Ethical hacking has other names, such as penetration testing , intrusion testing , and red-teaming . Ethical hackers do not typically have permission to destroy a network, can be held responsible if they exceed the limits of their contracts, and can be jailed or prosecuted if they break laws or exceed their legal privilege.