Filters
Question type

Study Flashcards

Within the US, this act made it a crime to knowingly access computers without authorization, obtain unauthorized information with intent to defraud, or cause damage to protected computers.?


A) The Law Commission
B) The Serious Crime Act
C) Computer Fraud and Abuse Act
D) Computer Misuse Act

E) All of the above
F) C) and D)

Correct Answer

verifed

verified

C

An early medical/pathological explanation for hacker behaviors was called _______________.?


A) Computer Obsession Complex
B) Internet Addiction Disorder
C) Hacker Drive Syndrome
D) Computer Addiction Disorder

E) A) and D)
F) B) and C)

Correct Answer

verifed

verified

B

Studies in hacking reveal it to be an overwhelmingly _______________.?


A) male activity
B) female activity
C) African-American activity
D) elderly activity

E) A) and B)
F) None of the above

Correct Answer

verifed

verified

Many scholars agree that the social base of the hacker movement is heavily skewed towards _______________.?


A) upper-class, older Asian males living in suburban areas
B) middle-class, Black males most likely attending college
C) lower-class, white females living close to institutions with technology
D) middle-class, white males who are most likely in high school

E) None of the above
F) A) and D)

Correct Answer

verifed

verified

According to Reagle, hacker culture is characterized by a _______________ which makes hackers and related technologists blind to the barriers facing women in entering and navigating hacking and other tech-related cultures.?


A) Hegemonic masculinity
B) Boy culture
C) Misogynistic discernment
D) NaΓ―ve meritocracy

E) B) and D)
F) None of the above

Correct Answer

verifed

verified

_______________ is a program which helps identify vulnerabilities in systems and allows users to craft "payloads" to exploit these vulnerabilities.?


A) Nmap
B) Metasploit
C) Wireshark
D) Bleem

E) A) and D)
F) None of the above

Correct Answer

verifed

verified

The first major motion picture to feature hackers, released in 1983, was entitled _______________.?


A) Hackers
B) Technophiles
C) War Games
D) Swordfish

E) None of the above
F) B) and C)

Correct Answer

verifed

verified

This type of computer intrusion is the stealing or copying of information, such as theft of software, business secrets, and personal information.?


A) Theft of proprietary/confidential information
B) Theft of computer resources
C) Systems sabotage
D) Denial of service attacks

E) A) and B)
F) None of the above

Correct Answer

verifed

verified

Which of the following is NOT an explanation for gender disparities in hacker culture given by Taylor?


A) Societal Factors
B) Masculine Environment
C) Masculine Language
D) Biological factors

E) None of the above
F) B) and C)

Correct Answer

verifed

verified

Within the literature, hacker criminality has been linked to all of these psychological factors except _______________.?


A) drug addiction
B) dementia
C) Asperger's syndrome
D) autism

E) None of the above
F) All of the above

Correct Answer

verifed

verified

B

In the 1960s, hacking was generally viewed as _______________.?


A) a means of global domination
B) a neutral term for software developers
C) the act of coughing after clearing dust from computer parts.
D) an innovative, free use of technology

E) B) and C)
F) A) and B)

Correct Answer

verifed

verified

_______________ is the author of the 1986 work "The Conscience of a Hacker" also known as "The Hacker's Manifesto."?


A) The Mentor
B) Commander X
C) Crash Override
D) Acid Burn

E) C) and D)
F) A) and B)

Correct Answer

verifed

verified

In 1988, Gold and Schifreen hacked into Prince Philip's _______________.?


A) computer
B) mailbox
C) phone
D) servers

E) A) and C)
F) All of the above

Correct Answer

verifed

verified

Constructing and viewing the hacker as an "archetypal 'cybercriminal'" is an example of what Becker (1963) would identify as the _______________.?


A) labelling process
B) learning process
C) socialization process
D) cultural process

E) C) and D)
F) A) and D)

Correct Answer

verifed

verified

In attempts to estimate interest in hacking, what is the example the book provides as an indicator?


A) Dark web activity
B) Reddit posts
C) DEF CON attendance
D) Amount of 4chan users

E) A) and B)
F) C) and D)

Correct Answer

verifed

verified

This type of computer intrusion is the altering of contents of a website or creating a 'fake' website.?


A) Distribution of 'malicious software'
B) Systems alteration and destruction
C) Website defacement and 'spoofing'
D) Theft of computer resources

E) A) and B)
F) C) and D)

Correct Answer

verifed

verified

_______________ coined the term "the hacker ethic" in his book Hackers: Heroes of the Computer Revolution.?


A) Steven Levy
B) Steve Wozniak
C) Richard Stallman
D) Linus Torvalds

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

This type of computer intrusion prevents a user or owner the access to services available on their system.?


A) Theft of proprietary/confidential information
B) Denial of service attacks
C) Theft of computer resources
D) Website defacement and 'spoofing'

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

Showing 1 - 18 of 18

Related Exams

Show Answer