Matching
Match each of the following terms to its meaning:
Premises:
black-hat hacker
grey-hat hacker
white-hat hacker
social engineering
cyberloafing
Responses:
an ethical hacker
an unethical hacker
techniques used to manipulate people into performing actions or divulging confidential information
using an employer's computer for non-work activities
flaunts expertise to the administrator of a system
Correct Answer:
Premises:
Responses:
black-hat hacker
grey-hat hacker
white-hat hacker
social engineering
cyberloafing
Premises:
black-hat hacker
grey-hat hacker
white-hat hacker
social engineering
cyberloafing
Responses:
Related Questions
Q3: _ hackers break into systems legally for
Q4: Match each of the following terms to
Q10: When malicious code is planted on your
Q10: Which of the following statements about cookies
Q38: Virtual private networks (VPNs) are secure networks
Q64: Unwanted, unsolicited e-mail is referred to as
Q65: A(n) _ protects a computer against power
Q72: Which type of virus was the famous
Q85: For security reasons, you should be extremely
Q94: A(n) _ can help block unwanted, unsolicited