Which of the following best describes ahacktivist?

a. An individual who attempts to destroy the infrastructure components of governments, financial institutions, utilities, and emergency response units
b. An individual who hacks computers or Web sites in an attempt to promote a political ideology
c. An employee or contractor who attempts to gain financially and/or disrupt a company’s information systems and business operations
d. An individual who captures trade secrets and attempts to gain an unfair competitive advantage


b. An individual who hacks computers or Web sites in an attempt to promote a political ideology
A hacktivist is an individual who hacks computers or Web sites in an attempt to promote a political ideology.Hacktivism is defined as hacking or breaking into an information or security system for a political or socially motivated purpose. The tools used by a hacktivist are similar to the ones used by a hacker, only the purpose and agenda vary.

Computer Science & Information Technology

You might also like to view...

A _________ firewall configuration involves stand alone firewall devices plus host based firewalls working together under a central administrative control.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Multiple ISDN channels can be combined for high-bandwidth video transmission using

a. N x 64 b. multirate ISDN c. H11 service d. all of the above

Computer Science & Information Technology

If data becomes scrambled as a result of a sort, click the _____ button.

A. Undo B. Save C. Repeat D. Sort

Computer Science & Information Technology

The Secure Sockets Layer does not ________.

a) require client authentication b) secure communication between two computers on the Internet c) determine whether packets have been maliciously altered during transmission. d) implement public-key cryptography using the RSA algorithm

Computer Science & Information Technology