An ethical hacker is also known as a:
A. good guy
B. Black Hat hacker
C. pen tester
D. investigator
Answer: C. pen tester
Computer Science & Information Technology
You might also like to view...
Of the classes below, the one that is most likely to be declared abstract is _________________.
a) Bat b) Squirrel c) Animal d) Iguana e) Parrot
Computer Science & Information Technology
When an image file or an MP3 file is loaded from disk into memory, __________ is transferred.
a. the first record b. one record at a time c. the entire file d. none of the above
Computer Science & Information Technology