What are attackers who target critical national infrastructures known as?
a. Ethical hackers
b. Crackers
c. Cyberterrorists
d. Whackers
ANS: C
Computer Science & Information Technology
You might also like to view...
What specifically does the PowerPoint Save option allow you to do?
What will be an ideal response?
Computer Science & Information Technology
Which of the following protocols allows a user to store email on the server but synchronize it to a mail application?
A. IMAP B. SNMP C. SMTP D. POP3
Computer Science & Information Technology