Hackers with their abilities to research vulnerabilities in software products and disclose them to companies that developed the software are known as ______.

a. bad hackers
b. careless hackers
c. ethical hackers
d. friendly hackers


c. ethical hackers

Criminal Justice

You might also like to view...

What are the preliminary duties of the responding officer at a crime scene?

What will be an ideal response?

Criminal Justice

Write the equation for the slope and y intercept below and identify each component.

What will be an ideal response?

Criminal Justice

__________ refers to situations in which unwelcome sexual conduct has the effect of unreasonably interfering with an individual's work performance or creating an intimidating environment

Fill in the blank(s) with correct word

Criminal Justice

Public and private sectors can have complimentary roles, but private security owes their allegiance to

a. clients and employers b. the public c. their agency d. the government

Criminal Justice