1015722, 5:22 PM
Chapter 1 Quiz
[Chapter 1 Quiz: CIS_214_10368-Securty Analysls Pen Testing
Due Sep 10 at 11:59pm Points 20 Questions 20
Available Aug 25 at 12am - Dec 10 at 11:59pm ‘Time Limit None
Instructions
This quiz consist of 20 questions, you will have one chance and there is no time limit.
Attempt History
Attempt Time Score
LATEST Attemy 44 minutes 20 out of 20
Score for this quiz: 20 out of 20
Submitted Sep 6 at 9:36pm
This attempt took 41 minutes.
Question 1 1/1 pts
Hacking requires that the practitioner be intimately familiar with the techniques of the
perpetrator or opponent.
False
Correct! True
Question 2 1/1 pts
‘The reading and techniques used by both ethical and malicious hackers are identical.
hitps:Rrenholmstatentructure.comlcoursesi6696/quizzes/24 184 ve1015/22, §22 PM ‘Chapter 1 Quiz: CIS_214_10368-Securty Analysis Pen Testing
Corse!
True
False
Making money is a rare motive among all classes of hacker.
True
Correct False
‘Viruses are indiscriminate in their damaging effects, but only expert hackers can set one
loose.
Correct False
True
| 4114 pts
| oe
|The protection of data provided to organizations or stored on personal computers is a
| high priority.
|
Correct! True
|ntips:venholstateinstructure comlcoursess6606/quizz08/24184
2181015122, 5:22 PM Chapter 1 Quiz: CIS_214_10388-Socurty Analysis Pen Testing
411 pts
|The __model is derived from old Westem genre movies where the "good guys”
| always wore white hats and the “bad guys” always wore black hats. |
|
comes White Hat/Black Hat
White Box/Black Box
White Protector/Black Demon
White Spy/Black Spy
Question 7 1/1 pts
“_" hackers are evidence that the dichotomy of good and evil is NOT a very good fit
to the real world,
Gray Service
Gray Box
Correct! Gray Hat
Gray Spy
I
| Question 8 1/1 pts
hitps:trenhoimetateinstructure.comvcourses/S606/quizz08/26 184 a81018/22, 522 PM CGhaptor 1 Quiz: CIS_214_10388-Securty Analysis Pen Testing
_____ hackers have limited computer and programming skills, and rely on toolkits to
conduct their attacks,
Correcti Novice
Coder
Old guard
Cyber-punk
Question 9 1/1 pts
hackers act as mentors to new hackers. They write scripts and tools that others use
Correct! Coders
Old guard
Hacktivists
Internal
4/1 pts
‘The profession of ____ is emerging from a chaotic set of conflicting ethics from both the
hobbyist and student communities and those on the information technology career track,
network analysis,
network response
hntps:trenholmstate.nstructure.comieourees/680e/quzzesi26104 481095/22, 5:22 PM Chapter 1 Quiz: CIS_214_10368-Security Analysis Pen Testing
ee network security
security response
Question 11 111 pts
Computer is the term for illegally hacking into a computer
system without the permission of the system's owner.
Correct!
cracking
orrect Answers cracking
414 pts
| are the principles of conduct that govern individuals, groups,
and professions.
oe ethics
orrect Answers Ethics
Question 13 1/1 pts
‘The first password hacks were a response to the
developed in the early 1960s and first
loaded on an IBM mainframe at MIT.
hitoe:trenholmetatenetructure.comlcoursesi6606/quizzes/24 184 581015/22, 5:22 PM Chapter 1 Qui: CIS_214_10368-Securily Analysis Pen Testing
Compatible Time Sharing System
orrect Answers. ‘Compatible Time Sharing System (CTSS) |
cTss |
Compatible Time Sharing System
Question 14 1/1 pts
In the 1970s, phone phreaks, a new sort of hacker, appeared. They used various methods,
collectively called ; to access telephone networks to make free
calls from payphones,
Correct! phreaking
orrect Answers —_phreaking
Question 15 ee
A(n)_____———__isa security professional who applies his or her hacking
skills for defensive purposes.
come ethical hacker
orrect Answers ethical hacker
Question 16 111 pts
How are hackers commonly categorized?
hitps:/renholmstate instructure.com/courses/6696/quizz0s/24184 61018/22, 522 PM Chapter 1 Quiz: CIS_214_10368-Secuty Analysis Pen Testing
Your Answer:
novices
cyber-punks
internals
old guard hackers
coders
professional criminals
information warriors/eyber-terrorist
hacktivist
n17 111 pts
Ques:
‘What are some of the hackers’ motivations?
Your Answer:
curiosity
love of puzzles
desire for recognition or fame
revenge
financial gain
patriotism or politics
Question 18 1/1 pts
Explain “love for puzzles” as a motivation for hackers.
htipsfrenholmstat.nstructue.comlcourses6696/quizzes/24184
7181018/22, 5:22 PM
CChaptor 1 Quiz: C1S_214_10368-Security Analysis Pen Testing
Your Answer:
Hackers gain great satisfaction in finding the solutions to complicated
puzzles. A hacker has to control many variables and master many
techniques to successfully crack systems.
Question 19 1/1 pts
‘What is the problem with using bandwidth without permission?
Your Answer:
It is essentially stealing.
Question 20 1/1 pts
What are the issues with copying, downloading, and using proprietary software and other
copyrighted works?
Your Answer:
Issues with copying, downloading, and using proprietary software is not
only that it is illegal but it deprives the original artists of legitimate
compensation.
Quiz Score: 20 out of 20
hitps:ftrenholmstateinstructure.comIcourses/S696/quizzes/24 184 88