Deck 3: Hackers, Crackers, and Viral Coders

Full screen (f)
exit full mode
Question
In the 1960s, hacking was generally viewed as _______________.?

A) a means of global domination
B) a neutral term for software developers
C) the act of coughing after clearing dust from computer parts.
D) an innovative, free use of technology
Use Space or
up arrow
down arrow
to flip the card.
Question
Constructing and viewing the hacker as an "archetypal 'cybercriminal'" is an example of what Becker (1963) would identify as the _______________.?

A) labelling process
B) learning process
C) socialization process
D) cultural process
Question
In attempts to estimate interest in hacking, what is the example the book provides as an indicator?

A) Dark web activity
B) Reddit posts
C) DEF CON attendance
D) Amount of 4chan users
Question
Within the literature, hacker criminality has been linked to all of these psychological factors except _______________.?

A) drug addiction
B) dementia
C) Asperger's syndrome
D) autism
Question
Studies in hacking reveal it to be an overwhelmingly _______________.?

A) male activity
B) female activity
C) African-American activity
D) elderly activity
Question
Within the US, this act made it a crime to knowingly access computers without authorization, obtain unauthorized information with intent to defraud, or cause damage to protected computers.?

A) The Law Commission
B) The Serious Crime Act
C) Computer Fraud and Abuse Act
D) Computer Misuse Act
Question
In 1988, Gold and Schifreen hacked into Prince Philip's _______________.?

A) computer
B) mailbox
C) phone
D) servers
Question
Many scholars agree that the social base of the hacker movement is heavily skewed towards _______________.?

A) upper-class, older Asian males living in suburban areas
B) middle-class, Black males most likely attending college
C) lower-class, white females living close to institutions with technology
D) middle-class, white males who are most likely in high school
Question
This type of computer intrusion is the stealing or copying of information, such as theft of software, business secrets, and personal information.?

A) Theft of proprietary/confidential information
B) Theft of computer resources
C) Systems sabotage
D) Denial of service attacks
Question
This type of computer intrusion is the altering of contents of a website or creating a 'fake' website.?

A) Distribution of 'malicious software'
B) Systems alteration and destruction
C) Website defacement and 'spoofing'
D) Theft of computer resources
Question
This type of computer intrusion prevents a user or owner the access to services available on their system.?

A) Theft of proprietary/confidential information
B) Denial of service attacks
C) Theft of computer resources
D) Website defacement and 'spoofing'
Question
The first major motion picture to feature hackers, released in 1983, was entitled _______________.?

A) Hackers
B) Technophiles
C) War Games
D) Swordfish
Question
An early medical/pathological explanation for hacker behaviors was called _______________.?

A) Computer Obsession Complex
B) Internet Addiction Disorder
C) Hacker Drive Syndrome
D) Computer Addiction Disorder
Question
_______________ coined the term "the hacker ethic" in his book Hackers: Heroes of the Computer Revolution.?

A) Steven Levy
B) Steve Wozniak
C) Richard Stallman
D) Linus Torvalds
Question
Which of the following is NOT an explanation for gender disparities in hacker culture given by Taylor?

A) Societal Factors
B) Masculine Environment
C) Masculine Language
D) Biological factors
Question
_______________ is a program which helps identify vulnerabilities in systems and allows users to craft "payloads" to exploit these vulnerabilities.?

A) Nmap
B) Metasploit
C) Wireshark
D) Bleem
Question
_______________ is the author of the 1986 work "The Conscience of a Hacker" also known as "The Hacker's Manifesto."?

A) The Mentor
B) Commander X
C) Crash Override
D) Acid Burn
Question
According to Reagle, hacker culture is characterized by a _______________ which makes hackers and related technologists blind to the barriers facing women in entering and navigating hacking and other tech-related cultures.?

A) Hegemonic masculinity
B) Boy culture
C) Misogynistic discernment
D) Naïve meritocracy
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/18
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 3: Hackers, Crackers, and Viral Coders
1
In the 1960s, hacking was generally viewed as _______________.?

A) a means of global domination
B) a neutral term for software developers
C) the act of coughing after clearing dust from computer parts.
D) an innovative, free use of technology
D
2
Constructing and viewing the hacker as an "archetypal 'cybercriminal'" is an example of what Becker (1963) would identify as the _______________.?

A) labelling process
B) learning process
C) socialization process
D) cultural process
A
3
In attempts to estimate interest in hacking, what is the example the book provides as an indicator?

A) Dark web activity
B) Reddit posts
C) DEF CON attendance
D) Amount of 4chan users
C
4
Within the literature, hacker criminality has been linked to all of these psychological factors except _______________.?

A) drug addiction
B) dementia
C) Asperger's syndrome
D) autism
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
5
Studies in hacking reveal it to be an overwhelmingly _______________.?

A) male activity
B) female activity
C) African-American activity
D) elderly activity
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
6
Within the US, this act made it a crime to knowingly access computers without authorization, obtain unauthorized information with intent to defraud, or cause damage to protected computers.?

A) The Law Commission
B) The Serious Crime Act
C) Computer Fraud and Abuse Act
D) Computer Misuse Act
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
7
In 1988, Gold and Schifreen hacked into Prince Philip's _______________.?

A) computer
B) mailbox
C) phone
D) servers
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
8
Many scholars agree that the social base of the hacker movement is heavily skewed towards _______________.?

A) upper-class, older Asian males living in suburban areas
B) middle-class, Black males most likely attending college
C) lower-class, white females living close to institutions with technology
D) middle-class, white males who are most likely in high school
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
9
This type of computer intrusion is the stealing or copying of information, such as theft of software, business secrets, and personal information.?

A) Theft of proprietary/confidential information
B) Theft of computer resources
C) Systems sabotage
D) Denial of service attacks
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
10
This type of computer intrusion is the altering of contents of a website or creating a 'fake' website.?

A) Distribution of 'malicious software'
B) Systems alteration and destruction
C) Website defacement and 'spoofing'
D) Theft of computer resources
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
11
This type of computer intrusion prevents a user or owner the access to services available on their system.?

A) Theft of proprietary/confidential information
B) Denial of service attacks
C) Theft of computer resources
D) Website defacement and 'spoofing'
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
12
The first major motion picture to feature hackers, released in 1983, was entitled _______________.?

A) Hackers
B) Technophiles
C) War Games
D) Swordfish
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
13
An early medical/pathological explanation for hacker behaviors was called _______________.?

A) Computer Obsession Complex
B) Internet Addiction Disorder
C) Hacker Drive Syndrome
D) Computer Addiction Disorder
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
14
_______________ coined the term "the hacker ethic" in his book Hackers: Heroes of the Computer Revolution.?

A) Steven Levy
B) Steve Wozniak
C) Richard Stallman
D) Linus Torvalds
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
15
Which of the following is NOT an explanation for gender disparities in hacker culture given by Taylor?

A) Societal Factors
B) Masculine Environment
C) Masculine Language
D) Biological factors
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
16
_______________ is a program which helps identify vulnerabilities in systems and allows users to craft "payloads" to exploit these vulnerabilities.?

A) Nmap
B) Metasploit
C) Wireshark
D) Bleem
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
17
_______________ is the author of the 1986 work "The Conscience of a Hacker" also known as "The Hacker's Manifesto."?

A) The Mentor
B) Commander X
C) Crash Override
D) Acid Burn
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
18
According to Reagle, hacker culture is characterized by a _______________ which makes hackers and related technologists blind to the barriers facing women in entering and navigating hacking and other tech-related cultures.?

A) Hegemonic masculinity
B) Boy culture
C) Misogynistic discernment
D) Naïve meritocracy
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 18 flashcards in this deck.