Someone who finds a flaw in a system and reports that flaw to the vendor of the system is a __________

a. White hat hacker
b. Black hat hacker
c. Gray hat hacker
d. Red hat hacker


Answer A. White hat hackers are often hired by companies to do penetration tests.

Computer Science & Information Technology

You might also like to view...

Data schemes consist of rules that combine data values in specific formats and locations to generate a new data values

Indicate whether the statement is true or false.

Computer Science & Information Technology

Jump buttons enable you to jump from slide to slide, and are assigned hyperlinks to direct their actions.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

_____ allows an existing application to be examined and broken down into a series of diagrams, structure charts, and source code.?

A. ?Forward engineering B. ?Limited perplexing C. ?Reverse engineering D. ?Boundless perplexing

Computer Science & Information Technology

What is the Performance Monitor utility, and how can it be used to troubleshoot system performance?

What will be an ideal response?

Computer Science & Information Technology