What is NOT true of white hat hackers? (2 points)

• They are breaking the law and are at risk of legal repercussions.
• They use the same methods as black hat hackers.
• They contribute to robust security systems.
• They alert companies of security vulnerabilities.

The two points that are NOT true of white hat hackers are:

1. They are breaking the law and are at risk of legal repercussions.
2. They use the same methods as black hat hackers.

What is NOT true of white hat hackers are:

1. They are breaking the law and are at risk of legal repercussions.
White hat hackers operate within legal boundaries and are authorized by companies to uncover vulnerabilities in their systems.

2. They use the same methods as black hat hackers.
White hat hackers do not employ the same techniques as black hat hackers, as their intention is to legally identify and assess vulnerabilities for the purpose of improving security.

Therefore, the correct answer is:
- They use the same methods as black hat hackers.

To determine what is NOT true about white hat hackers, we need to evaluate each statement:

1. They are breaking the law and are at risk of legal repercussions.
This statement is NOT true of white hat hackers. White hat hackers, also known as ethical hackers, use their skills to carry out security assessments and help organizations find vulnerabilities in their systems. They do this with permission and are authorized to access and test the security of systems. Therefore, they are not breaking the law and are not at risk of legal repercussions for their actions.

2. They use the same methods as black hat hackers.
This statement is NOT true of white hat hackers. White hat hackers adhere to a strict code of ethics and follow legal guidelines when conducting security assessments. They use their knowledge and skills to analyze systems and identify vulnerabilities while maintaining integrity and respect for the law. Black hat hackers, on the other hand, exploit vulnerabilities for personal gain or to cause harm.

3. They contribute to robust security systems.
This statement is TRUE of white hat hackers. White hat hackers play a crucial role in ensuring robust security systems. By actively searching for vulnerabilities and reporting their findings to the system owners or developers, white hat hackers help organizations patch these vulnerabilities before they can be exploited by malicious actors. Their contributions help strengthen security measures and protect against potential cyber threats.

4. They alert companies of security vulnerabilities.
This statement is TRUE of white hat hackers. When white hat hackers discover security vulnerabilities during their assessments, they responsibly disclose their findings to the respective companies, organizations, or system administrators. By doing so, they provide valuable information that enables organizations to rectify these weaknesses and enhance their security measures.

Based on the evaluation of these statements, the statement "They use the same methods as black hat hackers" is NOT true of white hat hackers.