White Hats are also known as ________, who use their hacking for defensive purposes.

A. Script Kiddies
B. Criminals
C. Hacktivists
D. Penetration Testers

Answer: D. Penetration Testers

Computer Science & Information Technology

You might also like to view...

The APA report style uses References as the title of the list of sources referenced

Indicate whether the statement is true or false

Computer Science & Information Technology

When a text file contains a single block of text, the ____ function would read the entire contents of the file into a string.

A. file_read_contents() B. file_open_contents() C. file_extract_contents() D. file_get_contents()

Computer Science & Information Technology