A hacker who intentionally removes or bypasses software copyright protection designed to prevent unauthorized duplication or use is known as a(n) __________.

A. penetration tester
B. expert hacker
C. phreaker
D. cracker

Answer: D

Computer Science & Information Technology

You might also like to view...

To select all slices in a pie, you double-click any slice

Indicate whether the statement is true or false

Computer Science & Information Technology

Which of the following wireless networking standards operates at only 5GHz?

A. 802.11a B. 802.11b C. 802.11g D. 802.11n

Computer Science & Information Technology