1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
swat32
2 years ago
10

Josh is learning about hackers known for causing damage and altering functions of websites. Which type of hacker is he learning

about?
A. Brown hat hacker
B. Black hat hacker
C. White hat hacker
D. Gray hat hacker
Computers and Technology
2 answers:
amid [387]2 years ago
4 0

Answer:

WHITE HACKERS

Explanation: When a white hat hacker discovers a vulnerability, they will exploit it only with permission and not tell others about it until it has been fixed. In contrast, the black hat will illegally exploit it or tell others how to do so. The gray hat will neither illegally exploit it nor tell others how to do so.

Step2247 [10]2 years ago
4 0

Answer:white hat hacker's

Explanation The white hat hacker is one who is an ethical hacker.

You might be interested in
Write motivation of cache memory​
tigry1 [53]

Answer:

To run the application and its calculate the numpers very quickly

3 0
4 years ago
im in honors comupter science and one of my questions is evaluate 18% 7 does anyone know how to answer that
yanalaym [24]

Answer:

18% of 7 is 1.26

Explanation:

your question was somewhat unclear

4 0
4 years ago
Information systems include all of these
Ulleksa [173]

Answer:

D

Explanation:

because you need people to access software through hardware and data through information and procedures.

4 0
3 years ago
C. why do manufacturers offer hard drive diagnostic software? what are the potential benefits of doing so to the manufacturer an
Alina [70]
<span>Hard drive diagnostic software can indicate whether there is a problem with a hard drive that is hardware related rather than software related, such as bad sectors. This software is beneficial to manufacturers as it can help isolate a problem that could be related to either hardware or software, helping to decide whether hardware needs to be repaired or replaced, and thereby reducing the cost to a manufacturer. This diagnostic software is also of benefit to the customer for the same reason in deciding whether to return a hard drive to the manufacturer or seeking a software-related solution. </span>
4 0
3 years ago
Read 2 more answers
An attacker gained remote access to a user's computer by exploiting a vulnerability in a piece of software on the device. The at
Anni [7]

"A Buffer overflow" vulnerability exploit resulted from the attacker's actions.

Whenever a software or an application writes too much data into a buffer, causing neighboring storage regions to have been corrupted as a consequence, this could be determined as Buffer overflow.

⇒ There are two kinds of Buffer overflow attacks such as:

  • <u>Stack-based</u> - It will become more popular to use such memory, as well as that's only available during implementation of any code.
  • <u>Heap-based</u> - Those attacks seem to be more difficult to execute because they entail overflowing overall storage capacity allotted for a program further than the space needed for something like the program's present activities.

Thus we can say that the correct answer is a Buffer overflow.

Learn more about Buffer overflow here:

brainly.com/question/4952591

6 0
3 years ago
Other questions:
  • When creating a software package, the software must be designed, the code must be written, and then the code must be tested. Thi
    6·1 answer
  • What are some examples of options you can control in the Adjust group to affect an image? (Multiple Choice)
    12·2 answers
  • What is the absolute pathname of the YUM configuration file? REMEMBER: An absolute pathname begins with a forward slash
    12·1 answer
  • Can you think of a shortcut for calculating the network addresses of consecutive /30 subnets?
    9·1 answer
  • Contextual targeting method mean
    11·1 answer
  • Assume TCP is operating in steady state congestion avoidance phase (no slow start) and the maximum congestion window size is 220
    8·1 answer
  • In which situations would it be most helpful to filter a form? Check all that apply.
    8·1 answer
  • I need a C++ program to ask the user to put in different numbers until zero is pressed then the program counts the numbers that
    10·1 answer
  • ¿Cuales son los dos estados de una computadora y que significa cada uno?
    8·1 answer
  • a good way to repeatedly perform an operation is to write the statements for the task once and then place the statements in a lo
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!