Que: Which of the following is not a proper use of RE for ethical hackers?

a. Check for poorly designed protocols
b. Check for error conditions
c. Cracking for making paid apps free for use
d. Testing for boundary conditions
Answer: Cracking for making paid apps free for use

Leave a Comment