Which of the following type of hackers will report a vulnerability when they find it?
a. White hat
b. Gray hat
c. Green hat
d. Black hat
ANS: A
Computer Science & Information Technology
You might also like to view...
There are federal laws that permit your employer to monitor your email communications, hence your ______ is not protected.?
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
To increase or decrease the font size by small amounts, click the ____ Font or Shrink Font buttons in the Font group on the Home tab or on the Mini toolbar.
A. Grow B. Enlarge C. Maximize D. Zoom
Computer Science & Information Technology