Someone who gains access to a system and causes harm is a __________?

a. White hat hacker
b. Black hat hacker
c. Grey hat hacker
d. Red hat hacker


Answer B. A black hat hacker might steal data, erase files, or deface websites.

Computer Science & Information Technology

You might also like to view...

Downcasting enables:

a. A derived-class object to be treated as a base-class object. b. A base-class object to be treated as a derived-class object. c. Making a base-class pointer into a derived-class pointer. d. Making a derived-class pointer into a base -class pointer.

Computer Science & Information Technology

An external entity may be:

A) a person. B) another department. C) another computer system. D) All of the above.

Computer Science & Information Technology

A caret is the small black ________ that displays when moving a worksheet tab to another location

Fill in the blank(s) with correct word

Computer Science & Information Technology

Each column represents a record that describes some attribute or characteristic of a person, place, or thing. ____________________

Answer the following statement true (T) or false (F)

Computer Science & Information Technology