Penetration testing should only be used during controlled conditions with express consent of the system owner because:
Which of the following is a trusted OS implementation used to prevent malicious or suspicious code from executing on Linux and UNIX platforms?