Multiple Choice
Who works at the request of the system owners to find system vulnerabilities and plug the holes?
A) White-hat hackers
B) Black-hat hackers
C) Hactivists
D) Script kiddies
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q30: What is social engineering?<br>A) Using one's social
Q31: Which of the following can be completed
Q32: _ attack computer systems by transmitting a
Q33: What identifies the rules required to maintain
Q34: _-hat hackers break into other people's computer
Q36: A(n)_ is software written with malicious intent
Q37: _ diving is a form of social
Q38: A(n)_ is hardware and/or software that guards
Q39: Who breaks into other people's computer systems
Q86: Describe the relationships and differences between hackers