Some who performs a cyberattack without actually understanding it is a _______

a. Gray hat hacker
b. White hat hacker
c. Script kiddie
d. None of the above

Answer C.

Computer Science & Information Technology

You might also like to view...

The biggest difference between internal users and customers is the ________ audience

Fill in the blank(s) with correct word

Computer Science & Information Technology

A security administrator is reviewing the company's data backup plan. The plan implements nightly offsite data replication to a third party company. Which of the following documents specifies how much data can be stored offsite, and how quickly the data can be retrieved by the company from the third party?

A. MTBF B. SLA C. RFQ D. ALE

Computer Science & Information Technology