________ hackers break into systems legally for non-malicious reasons such as to test system security vulnerabilities.

A. Black-hat
B. Gray-hat
C. White-hat
D. Green-hat


Answer: C

Computer Science & Information Technology

You might also like to view...

_____ is the stage of systems development that answers the question, "How will the information system solve a problem?"

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

When you click the More options button on the toolbar of the Computer or Windows Explorer window, you can select how to view folder contents (i.e. Details view).  Please name the three views you tend to use the most often, and why.

What will be an ideal response?

Computer Science & Information Technology

A technician wants to connect a new wireless router to a main network switch. Which of the following cable types would MOST likely be used to establish this connection?

A. Telephone B. Parallel C. Serial D. CAT6

Computer Science & Information Technology

Which of the following is the MOST energy efficient way of powering equipment within a datacenter with a large UPS battery bank?

A. 48V DC B. 120V single-phase C. 240VAC 3-phase D. 480V 3-phase

Computer Science & Information Technology