Someone who legally breaks into a system to assess security deficiencies is a ________

a. Script kiddy
b. Penetration tester
c. White hat hacker
d. Black hat hacker


Answer B. Anyone hired to assess the vulnerabilities of a system should be both technically proficient and ethical.

Computer Science & Information Technology

You might also like to view...

Using the Help feature, determine what security features are available in Visible Analyst®, or another CASE tool. Describe what you found in a brief memo, and include screen shots if possible.

What will be an ideal response?

Computer Science & Information Technology

Showing the gridlines on a table allows you to see how a table will display in print

Indicate whether the statement is true or false

Computer Science & Information Technology

Using good grammar, describe at least three safety measures to take when repairing devices

What will be an ideal response?

Computer Science & Information Technology

FIGURE 5-2____ detection was used in Figure 5-2 above to remove the full colors of the original image to uncover the outlines of the objects represented in the image.

A. Line B. Edge C. Luminance D. Color

Computer Science & Information Technology