CIS 333 Week 2 Quiz 3 CIS 333 Week 2 Quiz 3 | Page 7

________ is a method that black-hat hackers use to attempt to compromise logon and password access controls, usually following a specific attack plan, including the use of social engineering to obtain user information. • Question 20 Another type of attacker is called a ________. This is a person with little or no skill who simply follows directions or uses a “cookbook” approach to carrying out a cyberattack without understanding the meaning of the steps he or she is performing.