Answer:
Written authorization for performing intrusive penetration testing including system compromise and exploitation is required by any white hat hacking professional and information systems security consulting firm This is important because users may or may not have adequate data back-up and recovery capabilities
Explanation: