A penetration tester is reviewing the following SOW prior to engaging with a client:
`Network diagrams, logical and physical asset inventory, and employees' names are to be treated as client confidential. Upon completion of the engagement, the penetration tester will submit findings to the client's Chief Information Security Officer (CISO) via encrypted protocols and subsequently dispose of all findings by erasing them in a secure manner.`
Based on the information in the SOW, which of the following behaviors would be considered unethical? (Choose two.)
[Removed]
Highly Voted 3 years, 6 months agojedington
Highly Voted 3 years, 4 months agoMeisAdriano
Most Recent 11 months, 3 weeks agoMeisAdriano
11 months, 3 weeks agoAaronS1990
2 years, 3 months agoS_ed
2 years, 3 months agobieecop
2 years, 7 months agoStache
3 years agowillsy
3 years, 1 month agokiduuu
3 years, 2 months agoCharlieb123
3 years, 3 months agokiduuu
3 years, 2 months agobrandonl
3 years, 3 months agoshakevia463
2 years, 5 months agotokhs
3 years, 3 months agoDavar39
3 years, 6 months agoBinarySoldier
3 years, 7 months ago