An ethical hacker is also known as a:

A. good guy
B. Black Hat hacker
C. pen tester
D. investigator

Answer: C. pen tester

Computer Science & Information Technology

You might also like to view...

Of the classes below, the one that is most likely to be declared abstract is _________________.

a) Bat b) Squirrel c) Animal d) Iguana e) Parrot

Computer Science & Information Technology

When an image file or an MP3 file is loaded from disk into memory, __________ is transferred.

a. the first record b. one record at a time c. the entire file d. none of the above

Computer Science & Information Technology