A penetration tester is reviewing the following SOW prior to engaging with a client.
`Network diagrams, logical and physical asset inventory, and employees' names are to be treated as client confidential. Upon completion of the engagement, the penetration tester will submit findings to the client's Chief Information Security Officer (CISO) via encrypted protocols and subsequently dispose of all findings by erasing them in a secure manner.`
Based on the information in the SOW, which of the following behaviors would be considered unethical? (Choose two.)
Neolot
Highly Voted 2 years, 3 months agodeeden
Most Recent 10 months, 4 weeks agodeeden
10 months, 4 weeks agosolutionz
1 year, 6 months agonickwen007
1 year, 11 months agokloug
1 year, 11 months agoshakevia463
2 years agoshakevia463
2 years ago2Fish
2 years agoryanzou
2 years, 4 months agoryanzou
2 years, 4 months ago