If you are a member of a security penetration testing team, and you identify vulnerabilities and exploits, what should you obtain from the owners of the system in question prior to compromising and exploiting the known vulnerability?

Respuesta :

Answer:

Written authorization for performing intrusive penetration testing including system compromise and exploitation is required by any white hat hacking professional and information systems security consulting firm This is important because users may or may not have adequate data back-up and recovery capabilities

Explanation: