Deck 3: Hackers, Crackers, and Viral Coders
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/18
Play
Full screen (f)
Deck 3: Hackers, Crackers, and Viral Coders
1
In the 1960s, hacking was generally viewed as _______________.?
A) a means of global domination
B) a neutral term for software developers
C) the act of coughing after clearing dust from computer parts.
D) an innovative, free use of technology
A) a means of global domination
B) a neutral term for software developers
C) the act of coughing after clearing dust from computer parts.
D) an innovative, free use of technology
D
2
Constructing and viewing the hacker as an "archetypal 'cybercriminal'" is an example of what Becker (1963) would identify as the _______________.?
A) labelling process
B) learning process
C) socialization process
D) cultural process
A) labelling process
B) learning process
C) socialization process
D) cultural process
A
3
In attempts to estimate interest in hacking, what is the example the book provides as an indicator?
A) Dark web activity
B) Reddit posts
C) DEF CON attendance
D) Amount of 4chan users
A) Dark web activity
B) Reddit posts
C) DEF CON attendance
D) Amount of 4chan users
C
4
Within the literature, hacker criminality has been linked to all of these psychological factors except _______________.?
A) drug addiction
B) dementia
C) Asperger's syndrome
D) autism
A) drug addiction
B) dementia
C) Asperger's syndrome
D) autism
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
5
Studies in hacking reveal it to be an overwhelmingly _______________.?
A) male activity
B) female activity
C) African-American activity
D) elderly activity
A) male activity
B) female activity
C) African-American activity
D) elderly activity
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
6
Within the US, this act made it a crime to knowingly access computers without authorization, obtain unauthorized information with intent to defraud, or cause damage to protected computers.?
A) The Law Commission
B) The Serious Crime Act
C) Computer Fraud and Abuse Act
D) Computer Misuse Act
A) The Law Commission
B) The Serious Crime Act
C) Computer Fraud and Abuse Act
D) Computer Misuse Act
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
7
In 1988, Gold and Schifreen hacked into Prince Philip's _______________.?
A) computer
B) mailbox
C) phone
D) servers
A) computer
B) mailbox
C) phone
D) servers
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
8
Many scholars agree that the social base of the hacker movement is heavily skewed towards _______________.?
A) upper-class, older Asian males living in suburban areas
B) middle-class, Black males most likely attending college
C) lower-class, white females living close to institutions with technology
D) middle-class, white males who are most likely in high school
A) upper-class, older Asian males living in suburban areas
B) middle-class, Black males most likely attending college
C) lower-class, white females living close to institutions with technology
D) middle-class, white males who are most likely in high school
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
9
This type of computer intrusion is the stealing or copying of information, such as theft of software, business secrets, and personal information.?
A) Theft of proprietary/confidential information
B) Theft of computer resources
C) Systems sabotage
D) Denial of service attacks
A) Theft of proprietary/confidential information
B) Theft of computer resources
C) Systems sabotage
D) Denial of service attacks
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
10
This type of computer intrusion is the altering of contents of a website or creating a 'fake' website.?
A) Distribution of 'malicious software'
B) Systems alteration and destruction
C) Website defacement and 'spoofing'
D) Theft of computer resources
A) Distribution of 'malicious software'
B) Systems alteration and destruction
C) Website defacement and 'spoofing'
D) Theft of computer resources
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
11
This type of computer intrusion prevents a user or owner the access to services available on their system.?
A) Theft of proprietary/confidential information
B) Denial of service attacks
C) Theft of computer resources
D) Website defacement and 'spoofing'
A) Theft of proprietary/confidential information
B) Denial of service attacks
C) Theft of computer resources
D) Website defacement and 'spoofing'
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
12
The first major motion picture to feature hackers, released in 1983, was entitled _______________.?
A) Hackers
B) Technophiles
C) War Games
D) Swordfish
A) Hackers
B) Technophiles
C) War Games
D) Swordfish
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
13
An early medical/pathological explanation for hacker behaviors was called _______________.?
A) Computer Obsession Complex
B) Internet Addiction Disorder
C) Hacker Drive Syndrome
D) Computer Addiction Disorder
A) Computer Obsession Complex
B) Internet Addiction Disorder
C) Hacker Drive Syndrome
D) Computer Addiction Disorder
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
14
_______________ coined the term "the hacker ethic" in his book Hackers: Heroes of the Computer Revolution.?
A) Steven Levy
B) Steve Wozniak
C) Richard Stallman
D) Linus Torvalds
A) Steven Levy
B) Steve Wozniak
C) Richard Stallman
D) Linus Torvalds
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
15
Which of the following is NOT an explanation for gender disparities in hacker culture given by Taylor?
A) Societal Factors
B) Masculine Environment
C) Masculine Language
D) Biological factors
A) Societal Factors
B) Masculine Environment
C) Masculine Language
D) Biological factors
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
16
_______________ is a program which helps identify vulnerabilities in systems and allows users to craft "payloads" to exploit these vulnerabilities.?
A) Nmap
B) Metasploit
C) Wireshark
D) Bleem
A) Nmap
B) Metasploit
C) Wireshark
D) Bleem
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
17
_______________ is the author of the 1986 work "The Conscience of a Hacker" also known as "The Hacker's Manifesto."?
A) The Mentor
B) Commander X
C) Crash Override
D) Acid Burn
A) The Mentor
B) Commander X
C) Crash Override
D) Acid Burn
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
18
According to Reagle, hacker culture is characterized by a _______________ which makes hackers and related technologists blind to the barriers facing women in entering and navigating hacking and other tech-related cultures.?
A) Hegemonic masculinity
B) Boy culture
C) Misogynistic discernment
D) Naïve meritocracy
A) Hegemonic masculinity
B) Boy culture
C) Misogynistic discernment
D) Naïve meritocracy
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck