Someone who legally breaks into a system to assess security deficiencies is a ________

a. Script kiddy
b. Penetration tester
c. White hat hacker
d. Black hat hacker

Answer B. Anyone hired to assess the vulnerabilities of a system should be both technically proficient and ethical.

Computer Science & Information Technology

You might also like to view...

The term ________ refers to the documents, worksheets, songs, and so on that are created and stored during the day-to-day use of a computer

A) information B) folder C) data D) application

Computer Science & Information Technology

In VMware workstation Pro, by default, the new VM wizard will set the memory amount to what is recommended by the OS you are installing.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology