Exam 1: Ethics of Hacking and Cracking
Exam 1: Ethics of Hacking and Cracking18 Questions
Exam 2: Reconnaissance17 Questions
Exam 3: Scanning Tools18 Questions
Exam 4: Sniffers18 Questions
Exam 5: TCP/IP Vulnerabilities18 Questions
Exam 6: Encryption and Password Cracking18 Questions
Exam 7: Spoofing18 Questions
Exam 8: Session Hijacking18 Questions
Exam 9: Hacking Network Devices18 Questions
Exam 10: Trojan Horses18 Questions
Exam 11: Denial-Of-Service Attacks18 Questions
Exam 12: Buffer Overflows18 Questions
Exam 13: Programming Exploits18 Questions
Exam 14: Mail Vulnerabilities18 Questions
Exam 15: Web Application Vulnerabilities18 Questions
Exam 16: Windows Vulnerabilities18 Questions
Exam 17: Unix/Linux Vulnerabilities18 Questions
Exam 18: Incident Handling19 Questions
Select questions type
In the 1970s, phone phreaks, a new sort of hacker, appeared. They used various methods, collectively called ____________________, to access telephone networks to make free calls from payphones.
Free
(Short Answer)
5.0/5
(39)
Correct Answer:
phreaking
____________________ is a security professional who applies his or her hacking skills for defensive purposes.
Free
(Short Answer)
4.8/5
(28)
Correct Answer:
ethical hacker
How are hackers commonly categorized?
Free
(Essay)
4.8/5
(33)
Correct Answer:
There are distinct groups of hackers; however, the membership between groups is fluid. There are two ways commonly used to categorize them:
* The first is the simplest -White Hat good hackers vs. Black Hat bad hackers.
* The second is based loosely on psychological profiling and is a more complicated and more useful way to understand the motivations of hackers.
Viruses are indiscriminate in their damaging effects, but only expert hackers can set one loose.
(True/False)
4.8/5
(41)
____________________ are the principles of conduct that govern individuals, groups, and professions.
(Short Answer)
4.9/5
(32)
____ hackers have limited computer and programming skills, and rely on toolkits to conduct their attacks.
(Multiple Choice)
4.8/5
(29)
The first password hacks were a response to the ___________________________________, developed in the early 1960s and first loaded on an IBM mainframe at MIT.
(Short Answer)
5.0/5
(26)
The profession of ____ is emerging from a chaotic set of conflicting ethics from both the hobbyist and student communities and those on the information technology career track.
(Multiple Choice)
4.9/5
(44)
The ____ model is derived from old Western genre movies where the "good guys" always wore white hats and the "bad guys" always wore black hats.
(Multiple Choice)
4.7/5
(31)
Computer ____________________ is the term for illegally hacking into a computer system without the permission of the system's owner.
(Short Answer)
4.8/5
(25)
____ hackers act as mentors to new hackers. They write scripts and tools that others use.
(Multiple Choice)
4.8/5
(31)
The reading and techniques used by both ethical and malicious hackers are identical.
(True/False)
4.9/5
(40)
"____" hackers are evidence that the dichotomy of good and evil is NOT a very good fit to the real world.
(Multiple Choice)
4.9/5
(38)
Hacking requires that the practitioner be intimately familiar with the techniques of the perpetrator or opponent.
(True/False)
4.9/5
(33)
The protection of data provided to organizations or stored on personal computers is a high priority.
(True/False)
4.8/5
(37)
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)