Which of the following describes an instance of organ hacking? A. Penetration testing for a company b. Security hacking is never legal c. Looking for security risks d. Grey hat hacking

d. Grey hat hacking