Match each of the following terms to its meaning:I.gray-hat hackerII.black-hat hackerIII.cyberloafingIV.social engineeringV.white-hat hackerA.techniques used to manipulate people into performing actions or divulging confidentialĀ informationB.an unethical hackerC.flaunts expertise to the administrator of a systemD.an ethical hackerE.using an employer's computer for non-work activities

Fill in the blank(s) with the appropriate word(s).


C, B, E, A, D

Computer Science & Information Technology

You might also like to view...

Triple DES is not a suitable encryption technique for a VPN.

a. True b. False

Computer Science & Information Technology

A system that meets hardware and software requirements has just had a new version of Windows installed, but the system seems sluggish. What should the technician do?

A) Reinstall the old operating system. B) Defragment the hard drive. C) Replace the hard drive. D) Replace the memory modules.

Computer Science & Information Technology

Opening a file stream establishes the physical communication link between the program and the data file.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

___ TV uses a digital signal (series of 1s and 0s ) and is much clearer and less prone to inference than analog TV

A. digital B. interactive C. standard D. All the above

Computer Science & Information Technology