There are several models for ethical hacking that allow for effective penetration testing. Depending on the need of the company, a given penetration tester may choose to use all or one of these methods. Research White Box, Black Box, and Gray Box penetration testing models, and describe how each can be used to protect companies from black-hat hacking attempts.
Provide rationale to support your answer.
Please use 6th Ed APA format, also include proper in-text citations and references (including a retrieved from URL). Use at least 3 scholarly sources.