Which of the following best describes a white hat hacker?

a. A person that usually follows the law but in some cases performs illegal activities
b. Someone who is hacking into computer systems with the permission of the owner of the systems
c. Someone who hacks into systems to cause harm and/or for monetary gain
d. Someone who hacks into systems for fun

ANS: B

Computer Science & Information Technology

You might also like to view...

Removing the Shared designation from a workbook also will turn off which feature?

A) Track Changes B) Indicator Changes C) Reject Changes D) Review Changes

Computer Science & Information Technology

Which of the following devices is used to extend the signal strength on a network segment?

A. Repeater B. NIC C. Transceiver D. Modem

Computer Science & Information Technology