Chp1 Pen Testing

You might also like

Download as pdf
Download as pdf
You are on page 1of 8
1015722, 5:22 PM Chapter 1 Quiz [Chapter 1 Quiz: CIS_214_10368-Securty Analysls Pen Testing Due Sep 10 at 11:59pm Points 20 Questions 20 Available Aug 25 at 12am - Dec 10 at 11:59pm ‘Time Limit None Instructions This quiz consist of 20 questions, you will have one chance and there is no time limit. Attempt History Attempt Time Score LATEST Attemy 44 minutes 20 out of 20 Score for this quiz: 20 out of 20 Submitted Sep 6 at 9:36pm This attempt took 41 minutes. Question 1 1/1 pts Hacking requires that the practitioner be intimately familiar with the techniques of the perpetrator or opponent. False Correct! True Question 2 1/1 pts ‘The reading and techniques used by both ethical and malicious hackers are identical. hitps:Rrenholmstatentructure.comlcoursesi6696/quizzes/24 184 ve 1015/22, §22 PM ‘Chapter 1 Quiz: CIS_214_10368-Securty Analysis Pen Testing Corse! True False Making money is a rare motive among all classes of hacker. True Correct False ‘Viruses are indiscriminate in their damaging effects, but only expert hackers can set one loose. Correct False True | 4114 pts | oe |The protection of data provided to organizations or stored on personal computers is a | high priority. | Correct! True |ntips:venholstateinstructure comlcoursess6606/quizz08/24184 218 1015122, 5:22 PM Chapter 1 Quiz: CIS_214_10388-Socurty Analysis Pen Testing 411 pts |The __model is derived from old Westem genre movies where the "good guys” | always wore white hats and the “bad guys” always wore black hats. | | comes White Hat/Black Hat White Box/Black Box White Protector/Black Demon White Spy/Black Spy Question 7 1/1 pts “_" hackers are evidence that the dichotomy of good and evil is NOT a very good fit to the real world, Gray Service Gray Box Correct! Gray Hat Gray Spy I | Question 8 1/1 pts hitps:trenhoimetateinstructure.comvcourses/S606/quizz08/26 184 a8 1018/22, 522 PM CGhaptor 1 Quiz: CIS_214_10388-Securty Analysis Pen Testing _____ hackers have limited computer and programming skills, and rely on toolkits to conduct their attacks, Correcti Novice Coder Old guard Cyber-punk Question 9 1/1 pts hackers act as mentors to new hackers. They write scripts and tools that others use Correct! Coders Old guard Hacktivists Internal 4/1 pts ‘The profession of ____ is emerging from a chaotic set of conflicting ethics from both the hobbyist and student communities and those on the information technology career track, network analysis, network response hntps:trenholmstate.nstructure.comieourees/680e/quzzesi26104 48 1095/22, 5:22 PM Chapter 1 Quiz: CIS_214_10368-Security Analysis Pen Testing ee network security security response Question 11 111 pts Computer is the term for illegally hacking into a computer system without the permission of the system's owner. Correct! cracking orrect Answers cracking 414 pts | are the principles of conduct that govern individuals, groups, and professions. oe ethics orrect Answers Ethics Question 13 1/1 pts ‘The first password hacks were a response to the developed in the early 1960s and first loaded on an IBM mainframe at MIT. hitoe:trenholmetatenetructure.comlcoursesi6606/quizzes/24 184 58 1015/22, 5:22 PM Chapter 1 Qui: CIS_214_10368-Securily Analysis Pen Testing Compatible Time Sharing System orrect Answers. ‘Compatible Time Sharing System (CTSS) | cTss | Compatible Time Sharing System Question 14 1/1 pts In the 1970s, phone phreaks, a new sort of hacker, appeared. They used various methods, collectively called ; to access telephone networks to make free calls from payphones, Correct! phreaking orrect Answers —_phreaking Question 15 ee A(n)_____———__isa security professional who applies his or her hacking skills for defensive purposes. come ethical hacker orrect Answers ethical hacker Question 16 111 pts How are hackers commonly categorized? hitps:/renholmstate instructure.com/courses/6696/quizz0s/24184 6 1018/22, 522 PM Chapter 1 Quiz: CIS_214_10368-Secuty Analysis Pen Testing Your Answer: novices cyber-punks internals old guard hackers coders professional criminals information warriors/eyber-terrorist hacktivist n17 111 pts Ques: ‘What are some of the hackers’ motivations? Your Answer: curiosity love of puzzles desire for recognition or fame revenge financial gain patriotism or politics Question 18 1/1 pts Explain “love for puzzles” as a motivation for hackers. htipsfrenholmstat.nstructue.comlcourses6696/quizzes/24184 718 1018/22, 5:22 PM CChaptor 1 Quiz: C1S_214_10368-Security Analysis Pen Testing Your Answer: Hackers gain great satisfaction in finding the solutions to complicated puzzles. A hacker has to control many variables and master many techniques to successfully crack systems. Question 19 1/1 pts ‘What is the problem with using bandwidth without permission? Your Answer: It is essentially stealing. Question 20 1/1 pts What are the issues with copying, downloading, and using proprietary software and other copyrighted works? Your Answer: Issues with copying, downloading, and using proprietary software is not only that it is illegal but it deprives the original artists of legitimate compensation. Quiz Score: 20 out of 20 hitps:ftrenholmstateinstructure.comIcourses/S696/quizzes/24 184 88

You might also like