Match each of the following terms to its meaning:I.gray-hat hackerII.black-hat hackerIII.cyberloafingIV.social engineeringV.white-hat hackerA.techniques used to manipulate people into performing actions or divulging confidentialĀ informationB.an unethical hackerC.flaunts expertise to the administrator of a systemD.an ethical hackerE.using an employer's computer for non-work activities
Fill in the blank(s) with the appropriate word(s).
C, B, E, A, D
You might also like to view...
Triple DES is not a suitable encryption technique for a VPN.
a. True b. False
A system that meets hardware and software requirements has just had a new version of Windows installed, but the system seems sluggish. What should the technician do?
A) Reinstall the old operating system. B) Defragment the hard drive. C) Replace the hard drive. D) Replace the memory modules.
Opening a file stream establishes the physical communication link between the program and the data file.
Answer the following statement true (T) or false (F)
___ TV uses a digital signal (series of 1s and 0s ) and is much clearer and less prone to inference than analog TV
A. digital B. interactive C. standard D. All the above