Match each term with its correct definition.

A. People who break into computers and computer networks, often by exploiting weaknesses and preventable flaws.
B. A hacker who hacks for the purpose of a social goal or impact.
C. A hacker whose work is nondestructive.
D. A hacker whose work is extremely destructive.
E. A practice in which someone searches for and maps unsecured Wi-Fi networks from a vehicle.


A. hacker
B. hacktivist
C. white hat hacker
D. black hat hacker
E. war driving

Computer Science & Information Technology

You might also like to view...

This troubleshooting approach divides the OSI layers in half and starts at the middle of the stack, which is at the network layer.

What will be an ideal response?

Computer Science & Information Technology

To create a compound query that requires the results to match values in either field, you would use ________

A) And B) Or C) Not D) Maybe

Computer Science & Information Technology

To display the Chart Layout gallery, you click the More button in the:

A) Design group on the Layout tab. B) Chart Layouts group on the Design tab. C) Layout group on the Design tab. D) Chart group on the Layout tab.

Computer Science & Information Technology

A document that defines how an organization deals with some aspect of security is a(n) __________

a. Security policy b. Business plan c. Security update d. None of the above

Computer Science & Information Technology