Which of the following type of hackers will report a vulnerability when they find it?

a. White hat
b. Gray hat
c. Green hat
d. Black hat

ANS: A

Computer Science & Information Technology

You might also like to view...

There are federal laws that permit your employer to monitor your email communications, hence your ______ is not protected.?

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

To increase or decrease the font size by small amounts, click the ____ Font or Shrink Font buttons in the Font group on the Home tab or on the Mini toolbar.

A. Grow B. Enlarge C. Maximize D. Zoom

Computer Science & Information Technology