Competitive information gathering if done in the form of active attack using malware or by other illicit means can put your hired hacker or your company at stake.
(a) True
(b) False
I got this question in an online quiz.
I want to ask this question from Information Gathering Phase & Techniques topic in portion Phases of Security of Cyber Security