The term ____ refers to those who have mastered the firmware and software of modern computer systems, and enjoy the exploration and analysis of network security with no intent to intrude or cause harm.
A. cracker
B. consultant
C. hacker
D. defender
Answer: C
Computer Science & Information Technology
You might also like to view...
You can restrict access to Web pages by requiring users to ____________________ before they can view the pages.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
With a network that uses copper cabling, the _____________ layer defines the rules for turning ones and zeroes into electrical signals.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
There are two ways to write the depth-first traversal algorithm: we can write it recursively or we can write it using a stack.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
Which of the following network devices routes packets over a wireless network?
A. NIC B. WAP C. WEP D. CSU / DSU
Computer Science & Information Technology