Which of the following type of hackers hacks into systems to cause harm or steal data?

a. White hat
b. Gray hat
c. Green hat
d. Black hat

ANS: D

Computer Science & Information Technology

You might also like to view...

Which routing protocol do internet backbones use?

a. Border Gateway Protocol (BGP). b. Open Shortest Path First (OSPF). c. Routing Information Protocol (RIP). d. Enhanced Interior Gateway Routing Protocol (EIGRP).

Computer Science & Information Technology

________is the questioning process used in the jury selection process

a. Waiver of subrogation b. Motion in limine c. Voir dire d. None of the above

Computer Science & Information Technology