New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Eccouncil 312-50 Exam - Topic 3 Question 19 Discussion

Actual exam question for Eccouncil's 312-50 exam
Question #: 19
Topic #: 3
[All 312-50 Questions]

Yancey is a network security administrator for a large electric company. This company provides power for over 100, 000 people in Las Vegas. Yancey has worked for his company for over 15 years and has become very successful. One day, Yancey comes in to work and finds out that the company will be downsizing and he will be out of a job in two weeks. Yancey is very angry and decides to place logic bombs, viruses, Trojans, and backdoors all over the network to take down the company once he has left. Yancey does not care if his actions land him in jail for 30 or more years, he just wants the company to pay for what they are doing to him.

What would Yancey be considered?

Show Suggested Answer Hide Answer
Suggested Answer: A

Contribute your Thoughts:

0/2000 characters
Alaine
4 months ago
Suicide Hacker? That’s a new one for me, sounds extreme!
upvoted 0 times
...
Sarah
4 months ago
I think he’s just acting out of anger, not really a true hacker.
upvoted 0 times
...
Caprice
4 months ago
He’s been there 15 years, that’s a long time to just throw it all away!
upvoted 0 times
...
Christiane
4 months ago
Wait, is he really a Hacktivist? Seems more personal than political.
upvoted 0 times
...
Kiley
5 months ago
Definitely a Black Hat, no doubt about it.
upvoted 0 times
...
Huey
5 months ago
I thought Hacktivists were more about social causes? Yancey seems more vengeful than anything, so I don't think he fits that label.
upvoted 0 times
...
Sharan
5 months ago
This reminds me of a practice question we had about ethical hacking. I feel like Yancey is more of a Black Hat because he's using his skills for malicious intent.
upvoted 0 times
...
Lisha
5 months ago
I'm not entirely sure, but I think the term "Suicide Hacker" might apply here since he doesn't care about the consequences.
upvoted 0 times
...
Sharika
5 months ago
I remember studying the different types of hackers, and I think Yancey would definitely fit the Black Hat category since he's intentionally trying to harm the company.
upvoted 0 times
...
Elenore
5 months ago
Okay, let me see. If the service is experiencing inconsistent performance when accessing a shared database, then the Atomic Service Transaction pattern might be a good approach to ensure data consistency and reliability. I'll mark that one.
upvoted 0 times
...
Noel
5 months ago
This seems straightforward, I think the answer is C - the file will inherit the permissions of the destination folder.
upvoted 0 times
...
Carlee
5 months ago
This question seems straightforward, but I want to make sure I understand the MASPAR case study details before answering.
upvoted 0 times
...
Jill
5 months ago
Okay, the key here is the Waiver principle in Common law. I think the correct answer is True, since that principle assumes offers are revocable unless stated otherwise.
upvoted 0 times
...

Save Cancel