Match each term with its correct definition.
A. People who break into computers and computer networks, often by exploiting weaknesses and preventable flaws.
B. A hacker who hacks for the purpose of a social goal or impact.
C. A hacker whose work is nondestructive.
D. A hacker whose work is extremely destructive.
E. A practice in which someone searches for and maps unsecured Wi-Fi networks from a vehicle.
A. hacker
B. hacktivist
C. white hat hacker
D. black hat hacker
E. war driving
You might also like to view...
This troubleshooting approach divides the OSI layers in half and starts at the middle of the stack, which is at the network layer.
What will be an ideal response?
To create a compound query that requires the results to match values in either field, you would use ________
A) And B) Or C) Not D) Maybe
To display the Chart Layout gallery, you click the More button in the:
A) Design group on the Layout tab. B) Chart Layouts group on the Design tab. C) Layout group on the Design tab. D) Chart group on the Layout tab.
A document that defines how an organization deals with some aspect of security is a(n) __________
a. Security policy b. Business plan c. Security update d. None of the above