Deck 1: Ethics of Hacking and Cracking

Full screen (f)
exit full mode
Question
Hacking requires that the practitioner be intimately familiar with the techniques of the perpetrator or opponent.
Use Space or
up arrow
down arrow
to flip the card.
Question
The reading and techniques used by both ethical and malicious hackers are identical.
Question
Making money is a rare motive among all classes of hacker.
Question
Viruses are indiscriminate in their damaging effects, but only expert hackers can set one loose.
Question
The protection of data provided to organizations or stored on personal computers is a high priority.
Question
The ____ model is derived from old Western genre movies where the "good guys" always wore white hats and the "bad guys" always wore black hats.

A)White Hat/Black Hat
B)White Box/Black Box
C)White Protector/Black Demon
D)White Spy/Black Spy
Question
"____" hackers are evidence that the dichotomy of good and evil is NOT a very good fit to the real world.

A)Gray Spy
B)Gray Box
C)Gray Hat
D)Gray Service
Question
____ hackers have limited computer and programming skills, and rely on toolkits to conduct their attacks.

A)Cyber-punk
B)Coder
C)Old guard
D)Novice
Question
____ hackers act as mentors to new hackers. They write scripts and tools that others use.

A)Old guard
B)Coders
C)Hacktivists
D)Internal
Question
The profession of ____ is emerging from a chaotic set of conflicting ethics from both the hobbyist and student communities and those on the information technology career track.

A)network analysis
B)security response
C)network security
D)network response
Question
Computer ____________________ is the term for illegally hacking into a computer system without the permission of the system's owner.
Question
____________________ are the principles of conduct that govern individuals, groups, and professions.
Question
The first password hacks were a response to the ___________________________________, developed in the early 1960s and first loaded on an IBM mainframe at MIT.
Question
In the 1970s, phone phreaks, a new sort of hacker, appeared. They used various methods, collectively called ____________________, to access telephone networks to make free calls from payphones.
Question
____________________ is a security professional who applies his or her hacking skills for defensive purposes.
Question
How are hackers commonly categorized?
Question
What are some of the hackers' motivations?
Question
Explain "love for puzzles" as a motivation for hackers.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/18
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 1: Ethics of Hacking and Cracking
1
Hacking requires that the practitioner be intimately familiar with the techniques of the perpetrator or opponent.
True
2
The reading and techniques used by both ethical and malicious hackers are identical.
True
3
Making money is a rare motive among all classes of hacker.
False
4
Viruses are indiscriminate in their damaging effects, but only expert hackers can set one loose.
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
5
The protection of data provided to organizations or stored on personal computers is a high priority.
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
6
The ____ model is derived from old Western genre movies where the "good guys" always wore white hats and the "bad guys" always wore black hats.

A)White Hat/Black Hat
B)White Box/Black Box
C)White Protector/Black Demon
D)White Spy/Black Spy
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
7
"____" hackers are evidence that the dichotomy of good and evil is NOT a very good fit to the real world.

A)Gray Spy
B)Gray Box
C)Gray Hat
D)Gray Service
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
8
____ hackers have limited computer and programming skills, and rely on toolkits to conduct their attacks.

A)Cyber-punk
B)Coder
C)Old guard
D)Novice
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
9
____ hackers act as mentors to new hackers. They write scripts and tools that others use.

A)Old guard
B)Coders
C)Hacktivists
D)Internal
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
10
The profession of ____ is emerging from a chaotic set of conflicting ethics from both the hobbyist and student communities and those on the information technology career track.

A)network analysis
B)security response
C)network security
D)network response
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
11
Computer ____________________ is the term for illegally hacking into a computer system without the permission of the system's owner.
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
12
____________________ are the principles of conduct that govern individuals, groups, and professions.
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
13
The first password hacks were a response to the ___________________________________, developed in the early 1960s and first loaded on an IBM mainframe at MIT.
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
14
In the 1970s, phone phreaks, a new sort of hacker, appeared. They used various methods, collectively called ____________________, to access telephone networks to make free calls from payphones.
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
15
____________________ is a security professional who applies his or her hacking skills for defensive purposes.
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
16
How are hackers commonly categorized?
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
17
What are some of the hackers' motivations?
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
18
Explain "love for puzzles" as a motivation for hackers.
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 18 flashcards in this deck.