The term ____ refers to those who have mastered the firmware and software of modern computer systems, and enjoy the exploration and analysis of network security with no intent to intrude or cause harm.

A. cracker
B. consultant
C. hacker
D. defender


Answer: C

Computer Science & Information Technology

You might also like to view...

You can restrict access to Web pages by requiring users to ____________________ before they can view the pages.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

With a network that uses copper cabling, the _____________ layer defines the rules for turning ones and zeroes into electrical signals.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

There are two ways to write the depth-first traversal algorithm: we can write it recursively or we can write it using a stack.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Which of the following network devices routes packets over a wireless network?

A. NIC B. WAP C. WEP D. CSU / DSU

Computer Science & Information Technology