________ hackers break into systems legally for non-malicious reasons such as to test system security vulnerabilities.
A. Black-hat
B. Gray-hat
C. White-hat
D. Green-hat
Answer: C
You might also like to view...
_____ is the stage of systems development that answers the question, "How will the information system solve a problem?"
Fill in the blank(s) with the appropriate word(s).
When you click the More options button on the toolbar of the Computer or Windows Explorer window, you can select how to view folder contents (i.e. Details view). Please name the three views you tend to use the most often, and why.
What will be an ideal response?
A technician wants to connect a new wireless router to a main network switch. Which of the following cable types would MOST likely be used to establish this connection?
A. Telephone B. Parallel C. Serial D. CAT6
Which of the following is the MOST energy efficient way of powering equipment within a datacenter with a large UPS battery bank?
A. 48V DC B. 120V single-phase C. 240VAC 3-phase D. 480V 3-phase