Exam 3: Hackers, Crackers, and Viral Coders

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

An early medical/pathological explanation for hacker behaviors was called _______________.?

Free
(Multiple Choice)
4.9/5
(28)
Correct Answer:
Verified

B

Within the literature, hacker criminality has been linked to all of these psychological factors except _______________.?

Free
(Multiple Choice)
4.8/5
(26)
Correct Answer:
Verified

B

Within the US, this act made it a crime to knowingly access computers without authorization, obtain unauthorized information with intent to defraud, or cause damage to protected computers.?

Free
(Multiple Choice)
4.8/5
(43)
Correct Answer:
Verified

C

In 1988, Gold and Schifreen hacked into Prince Philip's _______________.?

(Multiple Choice)
4.9/5
(27)

_______________ is a program which helps identify vulnerabilities in systems and allows users to craft "payloads" to exploit these vulnerabilities.?

(Multiple Choice)
4.9/5
(27)

This type of computer intrusion is the altering of contents of a website or creating a 'fake' website.?

(Multiple Choice)
4.7/5
(29)

Many scholars agree that the social base of the hacker movement is heavily skewed towards _______________.?

(Multiple Choice)
4.9/5
(43)

In the 1960s, hacking was generally viewed as _______________.?

(Multiple Choice)
4.8/5
(35)

In attempts to estimate interest in hacking, what is the example the book provides as an indicator?

(Multiple Choice)
4.9/5
(39)

Constructing and viewing the hacker as an "archetypal 'cybercriminal'" is an example of what Becker (1963) would identify as the _______________.?

(Multiple Choice)
4.9/5
(38)

According to Reagle, hacker culture is characterized by a _______________ which makes hackers and related technologists blind to the barriers facing women in entering and navigating hacking and other tech-related cultures.?

(Multiple Choice)
4.9/5
(37)

_______________ coined the term "the hacker ethic" in his book Hackers: Heroes of the Computer Revolution.?

(Multiple Choice)
4.8/5
(32)

This type of computer intrusion prevents a user or owner the access to services available on their system.?

(Multiple Choice)
4.9/5
(36)

The first major motion picture to feature hackers, released in 1983, was entitled _______________.?

(Multiple Choice)
4.8/5
(33)

_______________ is the author of the 1986 work "The Conscience of a Hacker" also known as "The Hacker's Manifesto."?

(Multiple Choice)
4.9/5
(42)

Studies in hacking reveal it to be an overwhelmingly _______________.?

(Multiple Choice)
4.8/5
(35)

This type of computer intrusion is the stealing or copying of information, such as theft of software, business secrets, and personal information.?

(Multiple Choice)
4.8/5
(27)

Which of the following is NOT an explanation for gender disparities in hacker culture given by Taylor?

(Multiple Choice)
4.8/5
(34)
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)