1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sertanlavr [38]
3 years ago
14

Hacker is a person who illegally breaks into a system or network without any authorization to destroy, steal sensitive data or t

o perform any malicious attacks.
Black hat hackers are:
-Individuals with extraordinary computing skills, resorting to malicious or destructive activities and are also known as crackers
-Individuals professing hacker skills and using them for defensive purposes and are also known as security analysts
-Individuals who aim to bring down critical infrastructure for a "cause" and are not worried about facing 30 years in jail for their actions
-Individuals who work both offensively and defensively at various times
Computers and Technology
1 answer:
Oxana [17]3 years ago
8 0

Answer:

Black hat hackers are:

Option (a) Individuals with extraordinary computing skills, resorting to malicious or destructive activities and are also known as crackers

Explanation:

  • Black hat hackers are the Individuals with extraordinary computing skills, resorting to malicious or destructive activities and are also known as crackers
  • Black hat hackers hack the systems and websites unethically.
  • Security analysts are the experts hired by the company to find the loop holes in the networks, websites and systems. They are Ethical Hackers not the Black Hat Hackers.
  • Ethical Hackers find the vulnerabilities in the systems in order to make the systems more robust.
  • Security analysts analyses the security of the systems and they defend the systems, networks and websites from the attacks.
  • Security Analysts also detect the intrusions by hackers and do the after math after the attack in order to regain the control over systems. So, option (b) is false.
  • Option (c) is false as the jail term can be anywhere more or less than 30 years and they may not work for a "cause". They work for monetary benefits. They are malicious.
  • Option (d) is false. As the Black Hat Hackers are malicious they work for the destruction of the systems, websites and networks. So, they work Offensively. They don't defend the systems from the attacks. They are the attackers by themselves. They attack the systems by themselves.
You might be interested in
Ron is creating building blocks in Word. How can he make the building blocks that he created available?
daser333 [38]

A) Store those building in Normal template

7 0
3 years ago
Read 2 more answers
How do you get your winkey wet??
Lynna [10]

Answer:

what

Explanation:

what

sorry but what

7 0
2 years ago
Read 2 more answers
You are designing a wireless network for a client. Your client needs the network to support a data rate of at least 54Mbps. In a
mariarad [96]

Answer:

The best choice is 802.11a.

Explanation:

The most common option, that is widely used in home internet is 802.11b, however, this only supports a max speed of 11Mbps.

802.11a supports up to 54Mbps and it has regulated frequencies that prevent interference from other devices, such as the wireless system that your client already has. This option is more expensive, and its signal has issues going through walls and rooms but still, it is the one that fits him the most.

4 0
3 years ago
Ternary operators of computer<br><br>please explain. ​
Nitella [24]

Answer:

It's a compact way of doing an if-else statement.

General Format is

<<em>condition</em>> ? <if condition is true> : <else>;

Example:

I could rewrite:

  if(a==1) temp = 1;

  else     temp = 999;

as

  temp = (a==1) ? 1 : 999;

5 0
3 years ago
What is the problem with assigning a port number to more than one server application?
Ilya [14]
Only one daemon (server application) can bind to a port. The second one will fail.
3 0
4 years ago
Other questions:
  • What is the accounting equation?
    12·1 answer
  • Why it’s important to keep the standard internet protocol TCP/IP?
    11·1 answer
  • According to the video, what qualities do Human Services workers need? Check all that apply.
    11·2 answers
  • What is the FTC used car rule
    12·1 answer
  • Which of the following situations would not require knowledge of networking?
    11·2 answers
  • Use the drop-down menus to complete the statements about message marking, categorizing, and flagging.
    13·2 answers
  • Which of the following is an advantage of using
    6·2 answers
  • Write a formula that would return a TRUE result if the sum of the first five numbers in a column of data are negative
    7·1 answer
  • Anyone 13 i a boy 13 pan
    12·2 answers
  • Explain Http and Ftp​
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!