An information security professional with authorization to attempt to gain system access in an effort to identify and recommend resolutions for vulnerabilities in those systems is known as a(n) __________.
Penetration hacker is an information security personnel with permission to attempt to gain access in an effort to identify and recommend resolutions for an attack in those systems.