Module 6: Ethical Hacking

Ace your homework & exams now with Quizwiz!

Which of the following is NOT an example of the core principles involved with electronic civil disobedience? Select one: A. Any methods may be used, regardless of ethical standing B. No damage done to persons or property C. Willingness to accept personal responsibility for outcome of actions D. No actions done for personal profit

A. Any methods may be used, regardless of ethical standing

An offender using electronic funds transfers to take money out of someone else's account and put it into a personal account is known as: Select one: A. Banking fraud B. Investment fraud C. Telecommunications fraud D. Credit card fraud

A. Banking fraud

A script kiddie: Select one: A. Downloads hacker tools to use them. B. Writes hacker tools and website scripts. C. Writes software programs. D. Is a child who plays internet games.

A. Downloads hacker tools to use them.

An individual who works within a company or organization and uses his granted access in order to make some sort of gain or to get revenge for his own reasons, such as to punish his employer for giving him a demotion, is known as a(n): Select one: A. Insider B. Inside trader C. Industrial spy D. Black hat hacker

A. Insider

If a hacker finds a vulnerability within a system, which of the following is true? Select one: A. A black hat hacker will not exploit the vulnerability; a white hat hacker will try to exploit the vulnerability. B. A white hat hacker will not exploit the vulnerability; a black hat hacker will possibly try to exploit the vulnerability. C. A white hat hacker will not exploit the vulnerability; a black hat hacker will try to take advantage of the vulnerability only if they can gain money from the attack. D. A black hat hacker will not try to take advantage of the vulnerability; a white hat hacker will try to exploit the vulnerability only if they can gain money from the attack.

B. A white hat hacker will not exploit the vulnerability; a black hat hacker will possibly try to exploit the vulnerability.

Website vandalism is a type of: Select one: A. Cyber-assisted crime B. Cyber-specific crime C. Cyber-exacerbated crime D. None of the above

B. Cyber-specific crime

Of the following, which is a technique commonly used by hacktivists? Select one: A. Cyberterrorism B. Disruption C. SPAM D. Identity theft

B. Disruption

Which of the following is NOT an action that is often performed in cyberstalking cases? Select one: A. Harassment or defamation in chat rooms or message boards B. Finding information, harassment, defamation, and so forth solely without a computer C. Following in the physical world D. Online research of a victim

B. Finding information, harassment, defamation, and so forth solely without a computer

Which of the following is NOT a method or source that a cyberstalker may use to find information about a victim? Select one: A. Credit agencies B. Hospital websites C. Search engines D. Online investigative services

B. Hospital websites

Hacktivism is defined as: Select one: A. The participation in illegal activities in order to make monetary gains. B. The use of programming or other computer technologies to promote political ideology such as free speech, human rights, and information ethics. C. The act of exploiting or modifying computer security methods or manipulating code. D. The destruction of key infrastructure components of systems or organizations.

B. The use of programming or other computer technologies to promote political ideology such as free speech, human rights, and information ethics.

Which of the following is typically NOT a reason that a black hat hacker would perform an attack? Select one: A. In order to gain money B. To follow the hacker's code of ethics C. To prove to others that he has skill D. To become famous as a hacker E. None of the above

B. To follow the hacker's code of ethics

Which of the following is not a type of cybercriminal? Select one: A. Insider B. Tradesman C. Black hat hacker D. Industrial spy

B. Tradesman

Hacking is defined as: Select one: A. Destroying key infrastructure components of systems or organizations. B. Gaining access to other companies' computer systems in order to learn trade secrets and get a competitive advantage. C. The act of exploiting or modifying computer security methods or manipulating code. D. Using programs or other methods to disrupt operations or transmissions within networks or the internet, or using methods to cause damage to computer systems or their contained data

C. The act of exploiting or modifying computer security methods or manipulating code.

A is a set of circumstances that has the potential to cause loss or harm. Select one: A. Attack B. Vulnerability C. Threat D. Countermeasure E. None of the above

C. Threat

Which of the following is an example of electronic civil disobedience? Select one: A. Thousands of people reloading a webpage at the same time B. A person reloading a webpage C. A person launching a virus attack on a business's computer systems D. A person launching a denial-of-service attack on a website

D. A person launching a denial-of-service attack on a website

When a cyberstalker researches for information about a victim, they may use: Select one: A. Search engines B. Online investigative services C. Credit agencies D. All of the above E. None of the above

D. All of the above

Which of the following is a political ideology that hacktivists promote? Select one: A. Free Speech B. Human rights C. Information ethics D. All of the above E. None of the above

D. All of the above

What type of group uses an extreme focus on loss in order to get their political message across? Select one: A. Cyberstalkers B. Activist C. Hacktivist D. Cyberterrorist

D. Cyberterrorist

What type of group may launch a denial-of-service attack against a controversial website in order to stop others from viewing the material? Select one: A. Activist B. Cyberterrorist C. Cyberstalkers D. Hacktivist

D. Hacktivist

Which of the following is NOT commonly used as a hacktivist technique? Select one: A. Virtual sit-ins B. Disruption C. Black hat hacking, or cracking D. Identity theft

D. Identity theft

Online sexual predators can be difficult to track and/or convict because: Select one: A. They only prey on those online individuals who are outside of their home country. B. Detailed records are kept of their internet activities so everything they do can be traced back to them. C. They only prey on children because children do not have as many legal rights and are less likely to press charges against them. D. They are not restricted from registering for community websites and there is no indication that they are doing anything illegal.

D. They are not restricted from registering for community websites and there is no indication that they are doing anything illegal.

Which type of hacker is known for and will frequently follow the hacker's ethic? Select one: A. Red hat hacker B. Black hat hacker C. Cracker D. White hat hacker

D. White hat hacker

Which of the following is a reason for a black hat hacker to perform an attack? Select one: A. Fame B. Money C. Access D. Prove their skills E. All of the above F. None of the above

E. All of the above

True or False: A hacker may browse websites and try to find vulnerabilities. A white hat hacker will try to report the vulnerabilities to the website owner, while a black hat hacker will try to exploit the vulnerabilities. Select one: True False

True

Cyberstalking is an example of a: Select one: A. Cyber-assisted crime B. Cyber-specific crime C. Cyber-exacerbated crime D. None of the above

not C


Related study sets

Real Estate U Texas Promulgated Contract Forms(4)

View Set

Community Health Final CHAP 1-25

View Set

Maternal & Child Practice Exam 1

View Set

General Anthropology Final Exam Study Set

View Set

LARA-NOUR'S ULTIMATE 2020 AP ART HISTORY STUDY GUIDE

View Set