1. Which type of hacker is described in the scenario: After hacking into ATM machines remotely using a laptop, I worked with ATM manufacturers to resolve the security vulnerabilities that I discovered.
- White Hat
- Gray Hat
- Black Hat
2. Which type of hacker is described in the scenario: From my laptop, I transferred $10 million to my bank account using victim account numbers and PINs after viewing recordings of victims entering the numbers.
- White Hat
- Gray Hat
- Black Hat
3. Which type of hacker is described in the scenario: My job is to identify weaknesses in my company’s network.
- White Hat
- Gray Hat
- Black Hat
4. Which type of hacker is described in the scenario: I used malware to compromise several corporate systems to steal credit card information. I then sold that information to the highest bidder.
- White Hat
- Gray Hat
- Black Hat
5. Which type of hacker is described in the scenario: During my research for security exploits, I stumbled across a security vulnerability on a corporate network that I am authorized to access.
- White Hat
- Gray Hat
- Black Hat
6. Which type of hacker is described in the scenario It is my job to work with technology companies to fix a flaw with DNS.
- White Hat
- Gray Hat
- Black Hat