Choose an option below to fill in the blank.
VPN
hacker
IP address
virus
2. Which of the following statements regarding hackers are true?
Choose more than one option.
They always gain access to system resources from outside
They use Internet message boards to gain information on system security holes
They impersonate authorized users to gain access to systems
They all aim to defraud the companies whose systems they penetrate 3. What do ethical hackers do?
Choose an option.
Try to break into systems so as to defraud companies
Test a system's security to see where malicious hackers could gain access
Create antivirus software Impersonate authorized users using a spoof IP address in order to breach system security
沒有留言:
張貼留言