Someone who gains access to a system and causes harm is a __________?

a. White hat hacker
b. Black hat hacker
c. Grey hat hacker
d. Red hat hacker

Answer B. A black hat hacker might steal data, erase files, or deface websites.

Computer Science & Information Technology

You might also like to view...

POP3 uses which port by default?

a. 25 b. 110 c. 143 d. 443

Computer Science & Information Technology

Random access memory (RAM)is volatile.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology