Which of the following type of hackers hacks into systems to cause harm or steal data?
a. White hat
b. Gray hat
c. Green hat
d. Black hat
ANS: D
Computer Science & Information Technology
You might also like to view...
Which routing protocol do internet backbones use?
a. Border Gateway Protocol (BGP). b. Open Shortest Path First (OSPF). c. Routing Information Protocol (RIP). d. Enhanced Interior Gateway Routing Protocol (EIGRP).
Computer Science & Information Technology
________is the questioning process used in the jury selection process
a. Waiver of subrogation b. Motion in limine c. Voir dire d. None of the above
Computer Science & Information Technology