What are attackers who target critical national infrastructures known as?
a. Ethical hackers
b. Crackers
c. Cyberterrorists
d. Whackers
ANS: C
You might also like to view...
Justified text _____.
A. is positioned straight against the left margin and appears uneven on the right margin B. has both left and right margins aligned C. is centered but not aligned against either left or right margin D. is positioned straight against the right margin and appears uneven on the left margin
Background colors can be applied to ranges of cells to add interest to a worksheet
Indicate whether the statement is true or false.
If you want a lighter or darker shade of a selected color, you can click Custom and use the slider to change the color.
Answer the following statement true (T) or false (F)
____ programs perform a specific task.
A. Application B. System C. Operating D. Service