Which Statement Best Describes The Term Ethical Hacker