Which of the following best describes a white hat hacker?

a. A person that usually follows the law but in some cases performs illegal activities
b. Someone who is hacking into computer systems with the permission of the owner of the systems
c. Someone who hacks into systems to cause harm and/or for monetary gain
d. Someone who hacks into systems for fun


ANS: B

Computer Science & Information Technology

You might also like to view...

Match the following fields with the information they provide

I. Title A. current hour, minute, and second II. Subject B. current month, day, and year III. Author C. a blank field where the user may enter the Title of the document IV. Time D. a blank field where the user may enter the Subject of the document V. Date E. username provided when the software was registered

Computer Science & Information Technology

Typing text is also called ____________________ text.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

A virtual machine can't share the use of a network adapter with the host.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

?

A. The process of creating a duplicate image of data; one of the required functions of digital forensics tools? B. The process of trying every combination of characters--letters, numbers, and special characters typically found on a keyboard-- to find a matching password or passphrase value for an encrypted file? C. A project sponsored by the National Institute of Standards and Technology to manage research on digital forensics tools? D. The process of pulling relevant data from an image and recovering or reconstructing data fragments; one of the required functions of digital forensics tools.? E. A method of finding files or other information by entering relevant characters, words, or phrases in a search tool? F. A NIST project with the goal of collecting all known hash values for commercial software and OS files? G. An attack that uses a collection of words or phrases that might be passwords for an encrypted file.  H. ?The process of rebuilding data files; one of the required functions of digital forensics tools. I. A way to confirm that a tool is functioning as intended; one of the functions of digital forensics tools.? J. A hardware device or software program that prevents a computer from writing data to an evidence drive?

Computer Science & Information Technology