Match each item with a statement below.
A. An amateur cracker that uses programs and scripts written by other people to infringe upon a computer network system's integrity
B. Someone who breaks into computer networks without authorization and with malicious intent
C. A general term for any software that intentionally monitors and records a user's computer and/or Internet activities
D. A form of malware that disguises itself and its harmful code
E. An individual or groups of individuals that waver between the classification of a hacker and a cracker
F. A general term for software that uses typical malware intrusion techniques to obtain marketing data or advertise a product or service
G. A hacker that uses extensive experience and knowledge to test systems and provide security consultation to others, but poses no threat to network systems
H. Self-replicating malware that is able to harness the power of networks and use this power in its attacks against the networks
I. Hackers and crackers who use their extensive experience and skill to use networks to share their ideologies regarding controversial social, political, and economic topics
A. script kiddie
B. black hat
C. spyware
D. Trojan
E. grey hat
F. adware
G. white hat
H. worm
I. hactivist
You might also like to view...
If a class is named MyClass, what must theconstructors be named?
a) initializer b) MyClass c) Any name the programmer wishes except the name of the class d) ~MyClass e) None of the above.
If a hashing function runs in constant time, insertions, accesses, and removals of the associated keys are O(1).
Answer the following statement true (T) or false (F)
Emulation and virtualization are the same technology.
Answer the following statement true (T) or false (F)
In 1917, Gilbert S. Vernam, an AT&T employee, invented a polyalphabetic cipher machine that used a non-repeating random key.
Answer the following statement true (T) or false (F)