Test Bank For Computer Security and Penetration Testing 2nd Edition By Alfred Basta Nadine Basta Mary Brown
Chapter 1
True/False
Indicate whether the statement is true or false.
- Hacking requires that the practitioner be intimately familiar with the techniques of the perpetrator or opponent.
ANS: T PTS: 1 REF: 3
- The reading and techniques used by both ethical and malicious hackers are identical.
ANS: T PTS: 1 REF: 3
- Making money is a rare motive among all classes of hacker.
ANS: F PTS: 1 REF: 6
- Viruses are indiscriminate in their damaging effects, but only expert hackers can set one loose.
ANS: F PTS: 1 REF: 8
- The protection of data provided to organizations or stored on personal computers is a high priority.
ANS: T PTS: 1 REF: 11
Multiple Choice
Identify the choice that best completes the statement or answers the question.
- The ____ model is derived from old Western genre movies where the “good guys” always wore white hats and the “bad guys” always wore black hats.
a. | White Hat/Black Hat | c. | White Protector/Black Demon |
b. | White Box/Black Box | d. | White Spy/Black Spy |
ANS: A PTS: 1 REF: 2
- “____” hackers are evidence that the dichotomy of good and evil is NOT a very good fit to the real world.
a. | Gray Spy | c. | Gray Hat |
b. | Gray Box | d. | Gray Service |
ANS: C PTS: 1 REF: 2
3.____ hackers have limited computer and programming skills, and rely on toolkits to conduct their attacks.
a. | Cyber-punk | c. | Old guard |
b. | Coder | d. | Novice |
ANS: D PTS: 1 REF: 4
4.____ hackers act as mentors to new hackers. They write scripts and tools that others use.
a. | Old guard | c. | Hacktivists |
b. | Coders | d. | Internal |
ANS: B PTS: 1 REF: 4
- The profession of ____ is emerging from a chaotic set of conflicting ethics from both the hobbyist and student communities and those on the information technology career track.
a. | network analysis | c. | network security |
b. | security response | d. | network response |
ANS: C PTS: 1 REF: 6
Reviews
There are no reviews yet.