,Chapter 1
True/False
Indicate whether the statement is true or false.
1. Hacking requires that the practitioner be intimately familiar with the techniques of the perpetrator or opponent.
ANS: T PTS: 1 REF: 3
2. The reading and techniques used by both ethical and malicious hackers are identical.
ANS: T PTS: 1 REF: 3
3. Making money is a rare motive among all classes of hacker.
ANS: F PTS: 1 REF: 6
4. Viruses are indiscriminate in their damaging effects, but only expert hackers can set one loose.
ANS: F PTS: 1 REF: 8
5. The protection of data provided to organizations or stored on personal computers is a high priority.
ANS: T PTS: 1 REF: 11
Multiple Choice
Identify the choice that best completes the statement or answers the question.
1. The ____ model is derived from old Western genre movies where the “good guys” always wore white hats and the
“bad guys” always wore black hats.
a. White Hat/Black Hat c. White Protector/Black Demon
b. White Box/Black Box d. White Spy/Black Spy
ANS: A PTS: 1 REF: 2
2. “____” hackers are evidence that the dichotomy of good and evil is NOT a very good fit to the real world.
a. Gray Spy c. Gray Hat
b. Gray Box d. Gray Service
ANS: C PTS: 1 REF: 2
3. ____ hackers have limited computer and programming skills, and rely on toolkits to conduct their attacks.
a. Cyber-punk c. Old guard
b. Coder d. Novice
ANS: D PTS: 1 REF: 4
4. ____ hackers act as mentors to new hackers. They write scripts and tools that others use.
a. Old guard c. Hacktivists
, b. Coders d. Internal
ANS: B PTS: 1 REF: 4
5. The profession of ____ is emerging from a chaotic set of conflicting ethics from both the hobbyist and student
communities and those on the information technology career track.
a. network analysis c. network security
b. security response d. network response
ANS: C PTS: 1 REF: 6
Completion
Complete each statement.
1. Computer ____________________ is the term for illegally hacking into a computer system without the permission of
the system’s owner.
ANS: cracking
PTS: 1 REF: 2
2. ____________________ are the principles of conduct that govern individuals, groups, and professions.
ANS: Ethics
PTS: 1 REF: 6
3. The first password hacks were a response to the ___________________________________, developed in the early
1960s and first loaded on an IBM mainframe at MIT.
ANS:
Compatible Time Sharing System (CTSS)
Compatible Time Sharing System
CTSS
PTS: 1 REF: 7
4. In the 1970s, phone phreaks, a new sort of hacker, appeared. They used various methods, collectively called
____________________, to access telephone networks to make free calls from payphones.
ANS: phreaking
PTS: 1 REF: 7
5. A(n) ____________________ is a security professional who applies his or her hacking skills for defensive purposes.
ANS: ethical hacker
PTS: 1 REF: 12
, Short Answer
1. How are hackers commonly categorized?
ANS:
There are distinct groups of hackers; however, the membership between groups is fluid. There are two ways
commonly used to categorize them:
* The first is the simplest —White Hat good hackers vs. Black Hat bad hackers.
* The second is based loosely on psychological profiling and is a more complicated and more useful way to
understand the motivations of hackers.
PTS: 1 REF: 2
2. What are some of the hackers’ motivations?
ANS:
Regardless of the hacker’s profile, knowledge or skills, they are all powerfully motivated by something:
* Curiosity
* Love of puzzles
* Desire for recognition or fame
* Revenge
* Financial gain
a.* Patriotism or politics
PTS: 1 REF: 5
3. Explain “love for puzzles” as a motivation for hackers.
ANS:
Hackers gain great satisfaction in finding the solutions to complicated puzzles.There are many variables that
have to be controlled and techniques that have to be mastered to successfully crack systems. These are the
same challenges that motivate locksmiths and cat burglars in the physical security realm. Strong passwords,
such as “Tr34$>1drU,”(tr) can be devised that block most attack attempts, and locks can be keyed with
“024642” pin combinations which are almost unpickable. Think of the fun when you figure out how to solve
these difficult puzzles!
PTS: 1 REF: 5
4. What is the problem with using bandwidth without permission?
ANS:
Using bandwidth without permission may seem harmless, but what if accidental damage happens to a system
or if alteration to processing information and codes occurs? If the network has been hacked, it doesn’t much
matter whether the hacker directly caused the error or mischief, they will be blamed for any loss or damage.
In many states, unauthorized use of a computer system is a crime, in addition to being unethical.
PTS: 1 REF: 12
5. What are the issues with copying, downloading, and using proprietary software and other copyrighted works?
ANS:
True/False
Indicate whether the statement is true or false.
1. Hacking requires that the practitioner be intimately familiar with the techniques of the perpetrator or opponent.
ANS: T PTS: 1 REF: 3
2. The reading and techniques used by both ethical and malicious hackers are identical.
ANS: T PTS: 1 REF: 3
3. Making money is a rare motive among all classes of hacker.
ANS: F PTS: 1 REF: 6
4. Viruses are indiscriminate in their damaging effects, but only expert hackers can set one loose.
ANS: F PTS: 1 REF: 8
5. The protection of data provided to organizations or stored on personal computers is a high priority.
ANS: T PTS: 1 REF: 11
Multiple Choice
Identify the choice that best completes the statement or answers the question.
1. The ____ model is derived from old Western genre movies where the “good guys” always wore white hats and the
“bad guys” always wore black hats.
a. White Hat/Black Hat c. White Protector/Black Demon
b. White Box/Black Box d. White Spy/Black Spy
ANS: A PTS: 1 REF: 2
2. “____” hackers are evidence that the dichotomy of good and evil is NOT a very good fit to the real world.
a. Gray Spy c. Gray Hat
b. Gray Box d. Gray Service
ANS: C PTS: 1 REF: 2
3. ____ hackers have limited computer and programming skills, and rely on toolkits to conduct their attacks.
a. Cyber-punk c. Old guard
b. Coder d. Novice
ANS: D PTS: 1 REF: 4
4. ____ hackers act as mentors to new hackers. They write scripts and tools that others use.
a. Old guard c. Hacktivists
, b. Coders d. Internal
ANS: B PTS: 1 REF: 4
5. The profession of ____ is emerging from a chaotic set of conflicting ethics from both the hobbyist and student
communities and those on the information technology career track.
a. network analysis c. network security
b. security response d. network response
ANS: C PTS: 1 REF: 6
Completion
Complete each statement.
1. Computer ____________________ is the term for illegally hacking into a computer system without the permission of
the system’s owner.
ANS: cracking
PTS: 1 REF: 2
2. ____________________ are the principles of conduct that govern individuals, groups, and professions.
ANS: Ethics
PTS: 1 REF: 6
3. The first password hacks were a response to the ___________________________________, developed in the early
1960s and first loaded on an IBM mainframe at MIT.
ANS:
Compatible Time Sharing System (CTSS)
Compatible Time Sharing System
CTSS
PTS: 1 REF: 7
4. In the 1970s, phone phreaks, a new sort of hacker, appeared. They used various methods, collectively called
____________________, to access telephone networks to make free calls from payphones.
ANS: phreaking
PTS: 1 REF: 7
5. A(n) ____________________ is a security professional who applies his or her hacking skills for defensive purposes.
ANS: ethical hacker
PTS: 1 REF: 12
, Short Answer
1. How are hackers commonly categorized?
ANS:
There are distinct groups of hackers; however, the membership between groups is fluid. There are two ways
commonly used to categorize them:
* The first is the simplest —White Hat good hackers vs. Black Hat bad hackers.
* The second is based loosely on psychological profiling and is a more complicated and more useful way to
understand the motivations of hackers.
PTS: 1 REF: 2
2. What are some of the hackers’ motivations?
ANS:
Regardless of the hacker’s profile, knowledge or skills, they are all powerfully motivated by something:
* Curiosity
* Love of puzzles
* Desire for recognition or fame
* Revenge
* Financial gain
a.* Patriotism or politics
PTS: 1 REF: 5
3. Explain “love for puzzles” as a motivation for hackers.
ANS:
Hackers gain great satisfaction in finding the solutions to complicated puzzles.There are many variables that
have to be controlled and techniques that have to be mastered to successfully crack systems. These are the
same challenges that motivate locksmiths and cat burglars in the physical security realm. Strong passwords,
such as “Tr34$>1drU,”(tr) can be devised that block most attack attempts, and locks can be keyed with
“024642” pin combinations which are almost unpickable. Think of the fun when you figure out how to solve
these difficult puzzles!
PTS: 1 REF: 5
4. What is the problem with using bandwidth without permission?
ANS:
Using bandwidth without permission may seem harmless, but what if accidental damage happens to a system
or if alteration to processing information and codes occurs? If the network has been hacked, it doesn’t much
matter whether the hacker directly caused the error or mischief, they will be blamed for any loss or damage.
In many states, unauthorized use of a computer system is a crime, in addition to being unethical.
PTS: 1 REF: 12
5. What are the issues with copying, downloading, and using proprietary software and other copyrighted works?
ANS: