Identify and describe the phases that are involved with an ethical hacking exe
Identify and describe the phases that are involved with an ethical hacking exercise.Describe how an ethical hacker can also perform these steps and whether or not a boundary exists in the steps that an ethical hacker should not cross.If is there is a line, why should it not be crossed?Deliverable Length: 2–3 Pages