Which of the following is true of white hat hackers?
a. They are hired by an organization to test the security of its information systems.
b. They disrupt a company’s information systems and business operations.
c. They capture trade secrets and attempt to gain an unfair competitive advantage in a company.
d. They destroy the infrastructure components of governments, financial institutions, and emergency response units.
a. They are hired by an organization to test the security of its information systems.
White hat hackersare people who have been hired by an organization to test the security of its information systems. They use their skills to improve security by exposing vulnerabilities before malicious hackers (known as black hat hackers) can detect and exploit them.
You might also like to view...
Describe the Mac OS X operating system.
What will be an ideal response?
What code will make the image adjust to the width of the browser?
a. max-width: 100% b. img-size: 100% c. img-size: scale d. workspace: sized
A CRL is composed of:
A. Malicious IP address B. Trusted CA's C. untrusted private keys D. Public keys
To help you remember the shortcut key for the Transform Again command, think which of the following?
A. "T" for transform B. "R" for repeat C. "D" for duplicate D. "A" for again