____________ is the technique used in business organizations and firms to protect IT
assets.
a) Ethical hacking
b) Unethical hacking
c) Fixing bugs
d) Internal data-breach
assets.
a) Ethical hacking
b) Unethical hacking
c) Fixing bugs
d) Internal data-breach