Match the hacking terminology with its meaning

1. Wetware a. a subspecies of logic bomb that is triggered by reaching some predetermined time or is set to go off in the event that a programmer is fired and not available to suppress action
2. Time bomb b. a term traditionally used to refer to the method of cracking passwords by manually entering all possible key combinations
3. Bit bucket c. an individual hired by a company to test its security systems by attempting to violate them
4. Brute force d. the final destination of discarded, lost, or destroyed data
5. Sneaker e. a term used to refer to humans operating computers (as opposed to hardware and software)


Answer: 1. e
2. a
3. d
4. b
5. c

Computer Science & Information Technology

You might also like to view...

The processor has how many moving parts?

a. too many to count b. 8 c. 2 d. 0

Computer Science & Information Technology

A direct benefit of setting table relationships is that it can assist the database developer and the users when creating a single-table record source

Indicate whether the statement is true or false

Computer Science & Information Technology

Your bibliography should only list the references that you cited in parenthetical terms in your paper

Indicate whether the statement is true or false

Computer Science & Information Technology

Match each logical operator and media feature with its description.

A. and B. , C. not D. min-width E. max-width

Computer Science & Information Technology