Exam 3: Hackers, Crackers, and Viral Coders
Exam 1: Cybercrime and the Internet an Introduction13 Questions
Exam 2: Researching and Theorizing Cybercrime18 Questions
Exam 3: Hackers, Crackers, and Viral Coders18 Questions
Exam 4: Political Hacking20 Questions
Exam 5: Virtual Pirates21 Questions
Exam 6: Cyber-Frauds, Scams and Cons19 Questions
Exam 7: Illegal, Harmful and Offensive Content Online: From Hate Speech to the Dangers of Pornography18 Questions
Exam 8: Child Pornography and Child Sex Abuse Imagery22 Questions
Exam 9: The Victimization of Individuals Online: Cyberstalking and Paedophilia19 Questions
Exam 10: Policing the Internet17 Questions
Exam 11: Cybercrimes and Cyberliberties: Surveillance, Privacy and Crime Control18 Questions
Exam 12: Looking Toward the Future of Cybercrime6 Questions
Select questions type
An early medical/pathological explanation for hacker behaviors was called _______________.?
Free
(Multiple Choice)
4.9/5
(28)
Correct Answer:
B
Within the literature, hacker criminality has been linked to all of these psychological factors except _______________.?
Free
(Multiple Choice)
4.8/5
(26)
Correct Answer:
B
Within the US, this act made it a crime to knowingly access computers without authorization, obtain unauthorized information with intent to defraud, or cause damage to protected computers.?
Free
(Multiple Choice)
4.8/5
(43)
Correct Answer:
C
In 1988, Gold and Schifreen hacked into Prince Philip's _______________.?
(Multiple Choice)
4.9/5
(27)
_______________ is a program which helps identify vulnerabilities in systems and allows users to craft "payloads" to exploit these vulnerabilities.?
(Multiple Choice)
4.9/5
(27)
This type of computer intrusion is the altering of contents of a website or creating a 'fake' website.?
(Multiple Choice)
4.7/5
(29)
Many scholars agree that the social base of the hacker movement is heavily skewed towards _______________.?
(Multiple Choice)
4.9/5
(43)
In the 1960s, hacking was generally viewed as _______________.?
(Multiple Choice)
4.8/5
(35)
In attempts to estimate interest in hacking, what is the example the book provides as an indicator?
(Multiple Choice)
4.9/5
(39)
Constructing and viewing the hacker as an "archetypal 'cybercriminal'" is an example of what Becker (1963) would identify as the _______________.?
(Multiple Choice)
4.9/5
(38)
According to Reagle, hacker culture is characterized by a _______________ which makes hackers and related technologists blind to the barriers facing women in entering and navigating hacking and other tech-related cultures.?
(Multiple Choice)
4.9/5
(37)
_______________ coined the term "the hacker ethic" in his book Hackers: Heroes of the Computer Revolution.?
(Multiple Choice)
4.8/5
(32)
This type of computer intrusion prevents a user or owner the access to services available on their system.?
(Multiple Choice)
4.9/5
(36)
The first major motion picture to feature hackers, released in 1983, was entitled _______________.?
(Multiple Choice)
4.8/5
(33)
_______________ is the author of the 1986 work "The Conscience of a Hacker" also known as "The Hacker's Manifesto."?
(Multiple Choice)
4.9/5
(42)
Studies in hacking reveal it to be an overwhelmingly _______________.?
(Multiple Choice)
4.8/5
(35)
This type of computer intrusion is the stealing or copying of information, such as theft of software, business secrets, and personal information.?
(Multiple Choice)
4.8/5
(27)
Which of the following is NOT an explanation for gender disparities in hacker culture given by Taylor?
(Multiple Choice)
4.8/5
(34)
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)