Multiple Choice
Those who exploit systems for harm such as to erase files,change data,or deface Web sites are typically called:
A) white hat hackers
B) gray hat hackers
C) red hat hackers
D) black hat hackers
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q2: Which approach to security is proactive in
Q3: The process of determining whether the credentials
Q4: Which of the following is NOT a
Q5: _ is a type of attack where
Q6: The first computer incident-response team was sponsored
Q7: Which term is generally used by hackers
Q8: Which of the following maintains a repository
Q9: Since they are easier to perpetrate than
Q10: A term used to describe calling numerous
Q11: Flooding a system with many false connection