What are attackers who target critical national infrastructures known as?

a. Ethical hackers
b. Crackers
c. Cyberterrorists
d. Whackers

ANS: C

Computer Science & Information Technology

You might also like to view...

What specifically does the PowerPoint Save option allow you to do?

What will be an ideal response?

Computer Science & Information Technology

Which of the following protocols allows a user to store email on the server but synchronize it to a mail application?

A. IMAP B. SNMP C. SMTP D. POP3

Computer Science & Information Technology