_____________ is the technique used in business organizations and firms to protect IT assets.
(a) Ethical hacking
(b) Unethical hacking
(c) Fixing bugs
(d) Internal data-breach
This question was addressed to me in an interview for internship.
The doubt is from Ethics of Ethical Hacking topic in division Security Ethics, Security Breach Scenarios & Corporate Security of Cyber Security