Choose an option below to fill in the blank.
2. Which of the following statements regarding hackers are true?
Choose more than one option.
They always gain access to system resources from outside
They use Internet message boards to gain information on system security holes
They impersonate authorized users to gain access to systemsThey all aim to defraud the companies whose systems they penetrate
3. What do ethical hackers do?
Choose an option.
Try to break into systems so as to defraud companies
Test a system's security to see where malicious hackers could gain accessCreate antivirus software
Impersonate authorized users using a spoof IP address in order to breach system security