Which of the following is used to describe hacking activities that are motivated by purposes the perpetrator feels are ethically valid?

A) Computer-based espionage
B) Information warfare
C) Cyber terrorism
D) Hacktivism

D) Hacktivism

Computer Science & Information Technology

You might also like to view...

You can apply a ________ to the entire PivotTable report

A) PivotChart Style B) PivotTable Style C) PivotStyle D) PivotReport Style

Computer Science & Information Technology

The widest reaching type of permission in a SQL Server is database permissions.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology