Which perpetrator violates computer or Internet security maliciously for illegal personal gain?
a. A red hat hacker
b. A gray hat hacker
c. A white hat hacker
d. A black hat hacker
d. A black hat hacker
A black hat hacker is someone who violates computer or Internet security maliciously or for illegal personal gain (in contrast to a white hat hacker who is someone who has been hired by an organization to test the security of its information systems). He breaks into secure networks to destroy, modify, or steal data.
You might also like to view...
Almost every Ruby on Rails application involves the storage and retrieval of information using a ____.
A. web server B. database C. log file D. data file
To disable the Hide Extensions for Known File Types option, you can use ____________
a. The view tab of the Folder Options window b. sysconfig c. file.exe at the command prompt d. None of the above
Command scripts are just a series of commands saved in a file with a .bat extension.
Answer the following statement true (T) or false (F)
Kyle asked his supervisor which type of computing model was used when the enterprise first started. She explained that the organization purchased all the hardware and software necessary to run the company. What type of model was she describing to Kyle?
a. Virtual services b. Off-premises c. On-premises d. Hosted services