Someone who legally breaks into a system to assess security deficiencies is a ________
a. Script kiddy
b. Penetration tester
c. White hat hacker
d. Black hat hacker
Answer B. Anyone hired to assess the vulnerabilities of a system should be both technically proficient and ethical.
Computer Science & Information Technology
You might also like to view...
The term ________ refers to the documents, worksheets, songs, and so on that are created and stored during the day-to-day use of a computer
A) information B) folder C) data D) application
Computer Science & Information Technology
In VMware workstation Pro, by default, the new VM wizard will set the memory amount to what is recommended by the OS you are installing.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology