In part, the ISC 2 Code of Ethics states which of the following? A. Thou shalt not use a computer to harm other people. B. Compromising the privacy of users is unethical. C. All information should be free. D. Act honorably, honestly, justly, responsibly, and legally Solution B. Ethical hackers use the same methods as crackers and black-hat hackers, but they report the problems they find instead of taking advantage of them. Ethical hacking has other names, such as penetration testing , intrusion testing , and red-teaming . Ethical hackers do not typically have permission to destroy a network, can be held responsible if they exceed the limits of their contracts, and can be jailed or prosecuted if they break laws or exceed their legal privilege. .