Help quiz

User Generated

Tenpr032

Humanities

Description

I need help answering the attached quiz

thank you

I need help answering the attached quiz

thank you

Unformatted Attachment Preview

QUESTION 1 1. The terms 'hacking' and 'hacker' did not always refer to the unauthorized access to a computer or computer network. The original computer hackers: a. were technicians who tried to solve complex problems b. c. helped design and develop newer and better computer programs both a and b d. none of the above QUESTION 2 2. The Wire Fraud Act, National Stolen Property Act, and the Identity Theft Assumption Deterrence Act address a wide range of criminal acts, but contain sections that deal with the use of computers in the commission of specific crimes. 3. 4. TRUE 5. 6. FALSE QUESTION 3 7. The U.S. Computer Fraud and Abuse Act mandate stiff penalties for these actions, which are defined as criminal acts: a. b. Transmitting codes that cause damage to a computer system Accessing any computer connected to the Internet without authorization, even if no files were opened, copied or changed c. d. e. Transmitting classified government information Computer fraud and extortion All of the above QUESTION 4 8. Some “hactivists” (such as members of the group Anonymous) claim they use their hacking skills for ethical reasons, such as testing computer security or seeking justice in controversial matters. 9. 10. TRUE 11. 12. FALSE QUESTION 5 13. Malware, short for malicious software, involves various types of programs that can be downloaded unintentionally by a computer user. Its intent is usually to gain access to files or to a computer network to steal information, inflict damage or take control of a computer for criminal purposes. The most common types of malware are: a. b. c. d. e. Worms and viruses Trojan Horses Spyware and Adware Bots and Botnets All of the above QUESTION 6 14. A Denial of Service attack is one in which hactivists, political groups or even a country disrupts the use of a computer service by blocking the server's ability to respond to its clients. 15. 16. TRUE 17. 18. FALSE QUESTION 7 19. Essay 1Read the Firesheep case study (section 7.2.4, pages 325-328 in the 7th Edition) in the textbook. Carefully study the Ethical Evaluation of the case, then answer the following question.Was it ethical for Eric Butler to design and release the Firesheep extension? Take into account these factors, and be specific about each one, but state your own opinion and analysis: a. b. c. d. What he did Why he claims he did it The consequences of his action The ethical arguments from the Utilitarian and Kantian perspectives. QUESTION 8 20. Essay 2:Read the Internet Worm case study (7.3.2, pages 330-335 in the 7th Edition) in the textbook. Carefully study the Ethical Evaluation of the case, then answer the following question.Was it ethical for Robert Tappan Morris Jr. to design and launch what is now referred to as The Internet Worm? Take into account these factors, and be specific about each one, but state your own opinion and analysis: e. What he did f. Why he claims he did it g. The consequences of his action The ethical arguments from the Utilitarian and Kantian perspectives.
Purchase answer to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

hera are all the answers.people.oregonstate.edu/~vanlondp/cs391/ppt/quinn-ed6-ch7.pdfI attached it with the help you resquested filled.hope I helped! bye

QUESTION 1
1. Theterms 'hacking' and 'hacker'
didnotalwaysrefertotheunauthorizedaccessto a
computerorcomputernetwork. The original computer
hackers:
a.

weretechnicianswhotriedtosol
vecomplexproblems

b.

c.

helpeddesign and
developnewer and
bettercomputerprograms
both a and b

d.

noneoftheabove

I say c, a and b – computer virus, hack hacking came from computer programmers

QUESTION 2
2. The Wire FraudAct, NationalStolenPropertyAct, and
theIdentityTheftAssumptionDeterrenceActaddress a
widerangeof criminal acts,
butcontainsectionsthatdealwiththe use ofcomputers in
thecommissionofspecificcrimes.
3.
4.

TRUE

5.
6.

FALSE

True, 3? 5? Can’t see the questions

QUESTION 3
7. The U.S. ComputerFraud and Abuse Act mandate
stiffpenaltiesfortheseactions, which are defined as criminal
acts:
a.
b.

Transmittingcodesthat cause
damageto a computersystem
Accessinganycomputerconnect
edtothe Internet

c.
d.
e.

withoutauthorization, evenif
no files wereopened,
copiedorchanged
Transmittingclassifiedgovernm
entinformation
Computerfraud and extortion
Alloftheabove

b

QUESTION 4
8. Some “hactivists” (such as membersofthegroup
Anonymous) claimthey use their hacking
skillsforethicalreasons, such as
testingcomputersecurityorseekingjustice in controversial
matters.
9.
10.

TRUE

11.
12.

FALSE

true

QUESTION 5
13. Malware, short formalicious software,
involvesvarioustypesofprogramsthat can be
downloadedunintentionallyby a computeruser.
Itsintentisusuallytogainaccessto files orto a
computernetworktostealinformation, inflictdamageortake
control of a computerfor criminal purposes.
Themostcommontypesof malware are:

All of the above

a.
b.
c.

Worms and viruses
TrojanHorses
Spyware and Adware

d.
e.

Bots and Botnets
Alloftheabove

QUESTION 6
14. A DenialofServiceattackisone in whichhactivists,
politicalgroupsoreven a country disruptsthe use of a
computerservicebyblockingtheserver'sabilitytorespondtoitscli
ents.
15.
16.

TRUE

17.
18.

FALSE

19.

TRUE

QUESTION 7
20. Essay 1Read theFiresheep case study (section 7.2.4, pages
325-328 in the 7th Edition) in thetextbook.
CarefullystudytheEthicalEvaluationofthe case,
thenanswerthefollowingquestion.Wasitethicalfor Eric Butler
todesign and releasetheFiresheepextension?
Takeintoaccountthesefactors, and be specificabouteachone,
butstateyourownopinion and analysis:
a. What he did
October 2010: Eric Butler released Firesheep extension to Firefox browser
Firesheep made it possible for ordinary computer users to easily sidejack Web sessions
b. Why he claims he didit
Firesheep made it possible for ordinary computer users to easily sidejack Web sessions
c. Theconsequencesofhisaction
More than 500,000 downloads in first week • Attracted great deal of media attention
d. TheethicalargumentsfromtheUtilitarian and Kantianperspectives.
Release of Firesheep led media to focus on security problem
Accessing someone else’s user account is an invasion of their privacy and is wrong

QUESTION 8
21. Essay2:Readthe Internet Worm case study (7.3.2, pages
330-335 in the 7th Edition) in thetextbook.
CarefullystudytheEthicalEvaluationofthe case,
thenanswerthefollowingquestion.Wasitethicalfor Robert
Tappan Morris Jr. todesign and launchwhatisnowreferredto

as The Internet Worm? Takeintoaccountthesefactors, and
be specificabouteachone, butstateyourownopinion and
analysis:
Robert Tappan Morris, Jr. – Graduate student at Cornell – Released worm onto Internet from MIT
computer • Effect of worm – Spread to significant numbers of Unix computers – Infected computers
kept crashing or became unresponsive – Took a day for fixes to be published • Impact on Morris –
Suspended from Cornell – 3 years’ probation + 400 hours community service – $150,000 in legal fees
and fines
e. What he did
f. Why he claims he didit
g. Theconsequencesofhisa...


Anonymous
Awesome! Made my life easier.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Content

Related Tags