_____________ are individuals who damage information infrastructures purely for their own enjoyment and pleasure.
ACyber Trespassers
BWhite Hat Hackers
CCyber Vandals
DNone of the above
ACyber Trespassers
BWhite Hat Hackers
CCyber Vandals
DNone of the above
Related Questions:
Consider the following statements in the context of session hijacking.Which of the statement(s) given is/are correct ?