Search

In Stock

Test Bank For Computer Security and Penetration Testing 2nd Edition

$25.00

Test Bank For Computer Security and Penetration Testing 2nd Edition By Alfred Basta Nadine Basta Mary Brown

Chapter 1

True/False

Indicate whether the statement is true or false.

 

  1. Hacking requires that the practitioner be intimately familiar with the techniques of the perpetrator or opponent.

ANS:    T          PTS:     1          REF:    3

  1. The reading and techniques used by both ethical and malicious hackers are identical.

ANS:    T          PTS:     1          REF:    3

 

  1. Making money is a rare motive among all classes of hacker.

ANS:    F          PTS:     1          REF:    6

  1. Viruses are indiscriminate in their damaging effects, but only expert hackers can set one loose.

ANS:    F          PTS:     1          REF:    8

  1. The protection of data provided to organizations or stored on personal computers is a high priority.

ANS:    T          PTS:     1          REF:    11

Multiple Choice

Identify the choice that best completes the statement or answers the question.

  1. The ____ model is derived from old Western genre movies where the “good guys” always wore white hats and the “bad guys” always wore black hats.
a. White Hat/Black Hat c. White Protector/Black Demon
b. White Box/Black Box d. White Spy/Black Spy

ANS:    A         PTS:     1          REF:    2

 

  1. “____” hackers are evidence that the dichotomy of good and evil is NOT a very good fit to the real world.
a. Gray Spy c. Gray Hat
b. Gray Box d. Gray Service

ANS:    C          PTS:     1          REF:    2

 

3.____ hackers have limited computer and programming skills, and rely on toolkits to conduct their attacks.

a. Cyber-punk c. Old guard
b. Coder d. Novice

ANS:    D         PTS:     1          REF:    4

 

4.____ hackers act as mentors to new hackers. They write scripts and tools that others use.

a. Old guard c. Hacktivists
b. Coders d. Internal

ANS:    B          PTS:     1          REF:    4

 

  1. The profession of ____ is emerging from a chaotic set of conflicting ethics from both the hobbyist and student communities and those on the information technology career track.
a. network analysis c. network security
b. security response d. network response

ANS:    C          PTS:     1          REF:    6

Reviews

There are no reviews yet.

Write a review

Your email address will not be published. Required fields are marked *

 

 

Back to Top
Product has been added to your cart