Match each of the following terms to its meaning:
I. grey-hat hacker
II. black-hat hacker
III. cyberloafing
IV. social engineering
V. white-hat hacker
A) techniques used to manipulate people into performing actions or divulging confidential information
B) an unethical hacker
C) flaunts expertise to the administrator of a system
D) an ethical hacker
E) using an employer's computer for non-work activities
Correct Answer:
Verified
Q25: Ethical hackers are also known as white-hat
Q37: A denial-of-service attack can be used to
Q43: A stealth virus is designed to infect
Q46: Virtual private networks (VPNs) are secure networks
Q48: To create a secure password, you should
Q54: You should use the same password for
Q57: An encryption virus replicates itself onto a
Q58: A worm does NOT require human interaction
Q65: Match each of the following terms to
Q72: Match each of the following terms to
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents