Some who performs a cyberattack without actually understanding it is a _______
a. Gray hat hacker
b. White hat hacker
c. Script kiddie
d. None of the above
Answer C.
Computer Science & Information Technology
You might also like to view...
The biggest difference between internal users and customers is the ________ audience
Fill in the blank(s) with correct word
Computer Science & Information Technology
A security administrator is reviewing the company's data backup plan. The plan implements nightly offsite data replication to a third party company. Which of the following documents specifies how much data can be stored offsite, and how quickly the data can be retrieved by the company from the third party?
A. MTBF B. SLA C. RFQ D. ALE
Computer Science & Information Technology