Which of the following best describes a white hat hacker?
a. A person that usually follows the law but in some cases performs illegal activities
b. Someone who is hacking into computer systems with the permission of the owner of the systems
c. Someone who hacks into systems to cause harm and/or for monetary gain
d. Someone who hacks into systems for fun
ANS: B
Computer Science & Information Technology
You might also like to view...
Removing the Shared designation from a workbook also will turn off which feature?
A) Track Changes B) Indicator Changes C) Reject Changes D) Review Changes
Computer Science & Information Technology
Which of the following devices is used to extend the signal strength on a network segment?
A. Repeater B. NIC C. Transceiver D. Modem
Computer Science & Information Technology