header bg

Scan QR code or get instant email to install app

Question:

For defensive purposes, which type of threat actor only uses skills and knowledge?

A White hat
explanation