1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sertanlavr [38]
3 years ago
14

Hacker is a person who illegally breaks into a system or network without any authorization to destroy, steal sensitive data or t

o perform any malicious attacks.
Black hat hackers are:
-Individuals with extraordinary computing skills, resorting to malicious or destructive activities and are also known as crackers
-Individuals professing hacker skills and using them for defensive purposes and are also known as security analysts
-Individuals who aim to bring down critical infrastructure for a "cause" and are not worried about facing 30 years in jail for their actions
-Individuals who work both offensively and defensively at various times
Computers and Technology
1 answer:
Oxana [17]3 years ago
8 0

Answer:

Black hat hackers are:

Option (a) Individuals with extraordinary computing skills, resorting to malicious or destructive activities and are also known as crackers

Explanation:

  • Black hat hackers are the Individuals with extraordinary computing skills, resorting to malicious or destructive activities and are also known as crackers
  • Black hat hackers hack the systems and websites unethically.
  • Security analysts are the experts hired by the company to find the loop holes in the networks, websites and systems. They are Ethical Hackers not the Black Hat Hackers.
  • Ethical Hackers find the vulnerabilities in the systems in order to make the systems more robust.
  • Security analysts analyses the security of the systems and they defend the systems, networks and websites from the attacks.
  • Security Analysts also detect the intrusions by hackers and do the after math after the attack in order to regain the control over systems. So, option (b) is false.
  • Option (c) is false as the jail term can be anywhere more or less than 30 years and they may not work for a "cause". They work for monetary benefits. They are malicious.
  • Option (d) is false. As the Black Hat Hackers are malicious they work for the destruction of the systems, websites and networks. So, they work Offensively. They don't defend the systems from the attacks. They are the attackers by themselves. They attack the systems by themselves.
You might be interested in
Who wants to give free points to me?
Bad White [126]

Answer:

I can :) just comment lol

3 0
3 years ago
Read 2 more answers
What is a good principle to implement when you find yourself attempting to
Maurinko [17]

its less is more A

to much could make it really bad

5 0
3 years ago
Looking at the example below is the type value equal to a string or an integer?
Simora [160]
B. Integer I think that’s the answer
5 0
2 years ago
Read 2 more answers
Ps4 or xbox what do you have and why is your console better ​
bekas [8.4K]

Answer:

PS4

Explanation:

Cause its god

3 0
3 years ago
Read 2 more answers
python There is a reference variable office_a_c of type AirConditioner. Create a new object of type AirConditioner using the off
Kay [80]

Answer:

  1. class AirConditioner:
  2.  def __init__(self, a_c=False):
  3.    self.office_a_c = a_c  
  4. ac = AirConditioner()
  5. ac.office_a_c = True

Explanation:

Firstly, create a class and name it as AirConditioner (Line 1).

Next in the class constructor, create the reference variable office_a_c (Line 3). Please note the reference variable shall be preceded with a self keyword. Besides, the reference variable is set to False by default.

Create an AirConditioner object (Line 6) and then use the dot syntax (.) to set the object reference variable office_a_c to True.

8 0
3 years ago
Other questions:
  • Nick is a food blogger. He first writes his draft on an electronic document, checks and corrects mistakes, and pastes the conten
    9·2 answers
  • What is security in Technology<br>​
    8·2 answers
  • how to write a function "void funct()" which will accept a string from the user as input and will then display the string backwa
    11·1 answer
  • A hard disk has four surfaces (that's top and bottom of two platters). Each track has 2,048 sectors and there are 131,072 (217)
    11·1 answer
  • Ethics issues are significant in the area of online privacy because laws have not kept pace with the growth of the Internet and
    12·1 answer
  • What is a IT form? any help would be great thnx
    14·2 answers
  • Alright, don't judge me, this is a question that involves my Childhood game PvZ GW 2. So I noticed mods and stuff that get uploa
    12·2 answers
  • The best way to help prevent a system from a worm attack is to use anti-virus software anti-malware software a firewall a router
    12·1 answer
  • Tại sao xe chỉ sản xuất ra 1996cc mà không phải là 2000cc?
    6·2 answers
  • Select the correct answer.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!