In the context of computer crimes, those who cause problems, steal data, and corrupt systems are known as _____.
a. black hat hackers
b. white hat hackers
c. hacktivists
d. crackers
d. crackers
A cracker is an individual who causes problems, steals data, and corrupts systems. He or she possesses a high level of skill and knowledge with computers that enables him or her to interfere with the confidentiality of any information or security system.
You might also like to view...
Which of the following tools should you use to scan Unix systems?
A) NetStat Live B) Active Ports C) SATAN D) Cerberus
____ means, rather than executing the action by hand, you can simply tell Photoshop to apply the action to a folder of images.
A. Group process B. Batch process C. Process whole D. Time batch
What is the efficiency of merge sort?
a. O(log n). b. O(n). c. O(n log n). d. O(n2).
What different types of objects can be members of a distribution group?
What will be an ideal response?