Exam 1: Ethics of Hacking and Cracking

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

In the 1970s, phone phreaks, a new sort of hacker, appeared. They used various methods, collectively called ____________________, to access telephone networks to make free calls from payphones.

Free
(Short Answer)
5.0/5
(39)
Correct Answer:
Verified

phreaking

____________________ is a security professional who applies his or her hacking skills for defensive purposes.

Free
(Short Answer)
4.8/5
(28)
Correct Answer:
Verified

ethical hacker

How are hackers commonly categorized?

Free
(Essay)
4.8/5
(33)
Correct Answer:
Verified

There are distinct groups of hackers; however, the membership between groups is fluid. There are two ways commonly used to categorize them:
* The first is the simplest -White Hat good hackers vs. Black Hat bad hackers.
* The second is based loosely on psychological profiling and is a more complicated and more useful way to understand the motivations of hackers.

Explain "love for puzzles" as a motivation for hackers.

(Essay)
4.8/5
(28)

Viruses are indiscriminate in their damaging effects, but only expert hackers can set one loose.

(True/False)
4.8/5
(41)

____________________ are the principles of conduct that govern individuals, groups, and professions.

(Short Answer)
4.9/5
(32)

____ hackers have limited computer and programming skills, and rely on toolkits to conduct their attacks.

(Multiple Choice)
4.8/5
(29)

What are some of the hackers' motivations?

(Essay)
4.9/5
(29)

The first password hacks were a response to the ___________________________________, developed in the early 1960s and first loaded on an IBM mainframe at MIT.

(Short Answer)
5.0/5
(26)

Making money is a rare motive among all classes of hacker.

(True/False)
4.9/5
(31)

The profession of ____ is emerging from a chaotic set of conflicting ethics from both the hobbyist and student communities and those on the information technology career track.

(Multiple Choice)
4.9/5
(44)

The ____ model is derived from old Western genre movies where the "good guys" always wore white hats and the "bad guys" always wore black hats.

(Multiple Choice)
4.7/5
(31)

Computer ____________________ is the term for illegally hacking into a computer system without the permission of the system's owner.

(Short Answer)
4.8/5
(25)

____ hackers act as mentors to new hackers. They write scripts and tools that others use.

(Multiple Choice)
4.8/5
(31)

The reading and techniques used by both ethical and malicious hackers are identical.

(True/False)
4.9/5
(40)

"____" hackers are evidence that the dichotomy of good and evil is NOT a very good fit to the real world.

(Multiple Choice)
4.9/5
(38)

Hacking requires that the practitioner be intimately familiar with the techniques of the perpetrator or opponent.

(True/False)
4.9/5
(33)

The protection of data provided to organizations or stored on personal computers is a high priority.

(True/False)
4.8/5
(37)
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)