Which individual will examine an infrastructure to find existing vulnerabilities and, instead of hurting the infrastructure, report findings so that an administrator can further harden the network?

A. Forensic analyst
B. Black hat hacker
C. White hat hacker
D. First responder
 


Answer: C

Computer Science & Information Technology

You might also like to view...

Which of the following statements is false?

a. Thread scheduling is platform independent. b. One simple thread-scheduler implementation keeps the highest-priority thread running at all times and, if there’s more than one highest-priority thread, ensures that all such threads execute for a quantum each in round-robin fashion. c. The round-robin process for all highest-priority threads continues until all threads run to completion. d. Most programmers who use Java multithreading will not be concerned with setting and adjusting thread priorities

Computer Science & Information Technology

Which of the following is true about live migrations?

A. if a live migration fails, you must restart the source VM B. virtual disks are copied first, then the VM's memory is copied C. clients using the migrated VM usually have to reestablish network connectivity D. a host can participate in only one live migration at a time

Computer Science & Information Technology

The ____________________ layer of the Internet Reference Model is responsible for standardizing the presentation of data and providing the services that user applications need to communicate over the network

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

________ makes assumptions based on what we have heard or believe to be true

A) Channeling B) Stereotyping C) Nonverbal communication D) Feedback

Computer Science & Information Technology