________ hackers break into systems for non-malicious reasons such as to test system security vulnerabilities

A) Gray-hat
B) White-hat
C) Black-hat
D) Green-hat

B

Computer Science & Information Technology

You might also like to view...

The nodes (leaves) of the DNS database tree structure are called ____________________ and have labels.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Most desktop computers require an internal or external wireless adapter to connect to a wireless access point.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology