Deck 2: Computer Hackers and Hacking

Full screen (f)
exit full mode
Question
A skilled hacker who engages in hacks with malicious outcomes may be commonly referred to as what type of hacker?

A) black hat
B) white hat
C) gray hat
D) none of the above
Use Space or
up arrow
down arrow
to flip the card.
Question
What term referrs to a hacker who operates with no connection to a military or government organization?

A) non-nation-state actor
B) state-sponsored actor
C) hactivist
D) cyberterrorist
Question
What hacker was arrested in the 1990s who later became a computer security expert?

A) Eric Bloodaxe
B) Kevin Mitnick
C) John Draper
D) Ivanov
Question
Which of the following US federal agencies investigate hacking cases that appear to involve espionage, nation-states, and counterintelligence?

A) Customs and Border Patrol
B) US Secret Service
C) US Postal Inspector Service
D) Federal Bureau of Investigation
Question
Which UK hacking law was created due to the Schifreen and Gold case of 1984?

A) Computer Misuse Act
B) Computer Fraud and Abuse Act
C) Copyright Act
D) none of the above
Question
What is the term used to describe flaws in computer hardware or software that hackers exploit to affect system operations?

A) exploit
B) error
C) vulnerability
D) none of the above
Question
What is the name for physical locations operated by hackers to share knowledge about computers, digital devices, locks, and physical security?

A) hacker spaces
B) BBS
C) cons
D) none of the above
Question
What is the term used to describe an individual who is new to the hacker scene who wants to gain more skill?

A) script kiddie
B) noob
C) elite
D) gray hat
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/8
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 2: Computer Hackers and Hacking
1
A skilled hacker who engages in hacks with malicious outcomes may be commonly referred to as what type of hacker?

A) black hat
B) white hat
C) gray hat
D) none of the above
A
2
What term referrs to a hacker who operates with no connection to a military or government organization?

A) non-nation-state actor
B) state-sponsored actor
C) hactivist
D) cyberterrorist
A
3
What hacker was arrested in the 1990s who later became a computer security expert?

A) Eric Bloodaxe
B) Kevin Mitnick
C) John Draper
D) Ivanov
B
4
Which of the following US federal agencies investigate hacking cases that appear to involve espionage, nation-states, and counterintelligence?

A) Customs and Border Patrol
B) US Secret Service
C) US Postal Inspector Service
D) Federal Bureau of Investigation
Unlock Deck
Unlock for access to all 8 flashcards in this deck.
Unlock Deck
k this deck
5
Which UK hacking law was created due to the Schifreen and Gold case of 1984?

A) Computer Misuse Act
B) Computer Fraud and Abuse Act
C) Copyright Act
D) none of the above
Unlock Deck
Unlock for access to all 8 flashcards in this deck.
Unlock Deck
k this deck
6
What is the term used to describe flaws in computer hardware or software that hackers exploit to affect system operations?

A) exploit
B) error
C) vulnerability
D) none of the above
Unlock Deck
Unlock for access to all 8 flashcards in this deck.
Unlock Deck
k this deck
7
What is the name for physical locations operated by hackers to share knowledge about computers, digital devices, locks, and physical security?

A) hacker spaces
B) BBS
C) cons
D) none of the above
Unlock Deck
Unlock for access to all 8 flashcards in this deck.
Unlock Deck
k this deck
8
What is the term used to describe an individual who is new to the hacker scene who wants to gain more skill?

A) script kiddie
B) noob
C) elite
D) gray hat
Unlock Deck
Unlock for access to all 8 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 8 flashcards in this deck.