________ is a method that black-hat hackers use to attempt to compromise logon and
password access controls, usually following a specific attack plan, including the use of social
engineering to obtain user information.
•
Question 20
Another type of attacker is called a ________. This is a person with little or no skill who
simply follows directions or uses a “cookbook” approach to carrying out a cyberattack without
understanding the meaning of the steps he or she is performing.