An ethical hacker is also known as a:

A. good guy
B. Black Hat hacker
C. pen tester
D. investigator


Answer: C. pen tester

Computer Science & Information Technology

You might also like to view...

Which of the following pairs demonstrates the is-a relationship between the first and the second terms?

a) car, engine b) book, table of contents c) baseball, sport d) None of the above

Computer Science & Information Technology

Write a while loop that uses an explicit iterator to accomplish the same thing

What will be an ideal response?

Computer Science & Information Technology

The misspelled word "hellu" will have a ________ wavy underline

Fill in the blank(s) with correct word

Computer Science & Information Technology

A security framework specifies the tasks for deploying security tools in the order in which they are to be accomplished.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology