Description
I need help answering the attached quiz
I need help answering the attached quiz
Unformatted Attachment Preview
Purchase answer to see full attachment
Explanation & Answer
hera are all the answers.people.oregonstate.edu/~vanlondp/cs391/ppt/quinn-ed6-ch7.pdfI attached it with the help you resquested filled.hope I helped! bye
QUESTION 1
1. Theterms 'hacking' and 'hacker'
didnotalwaysrefertotheunauthorizedaccessto a
computerorcomputernetwork. The original computer
hackers:
a.
weretechnicianswhotriedtosol
vecomplexproblems
b.
c.
helpeddesign and
developnewer and
bettercomputerprograms
both a and b
d.
noneoftheabove
I say c, a and b – computer virus, hack hacking came from computer programmers
QUESTION 2
2. The Wire FraudAct, NationalStolenPropertyAct, and
theIdentityTheftAssumptionDeterrenceActaddress a
widerangeof criminal acts,
butcontainsectionsthatdealwiththe use ofcomputers in
thecommissionofspecificcrimes.
3.
4.
TRUE
5.
6.
FALSE
True, 3? 5? Can’t see the questions
QUESTION 3
7. The U.S. ComputerFraud and Abuse Act mandate
stiffpenaltiesfortheseactions, which are defined as criminal
acts:
a.
b.
Transmittingcodesthat cause
damageto a computersystem
Accessinganycomputerconnect
edtothe Internet
c.
d.
e.
withoutauthorization, evenif
no files wereopened,
copiedorchanged
Transmittingclassifiedgovernm
entinformation
Computerfraud and extortion
Alloftheabove
b
QUESTION 4
8. Some “hactivists” (such as membersofthegroup
Anonymous) claimthey use their hacking
skillsforethicalreasons, such as
testingcomputersecurityorseekingjustice in controversial
matters.
9.
10.
TRUE
11.
12.
FALSE
true
QUESTION 5
13. Malware, short formalicious software,
involvesvarioustypesofprogramsthat can be
downloadedunintentionallyby a computeruser.
Itsintentisusuallytogainaccessto files orto a
computernetworktostealinformation, inflictdamageortake
control of a computerfor criminal purposes.
Themostcommontypesof malware are:
All of the above
a.
b.
c.
Worms and viruses
TrojanHorses
Spyware and Adware
d.
e.
Bots and Botnets
Alloftheabove
QUESTION 6
14. A DenialofServiceattackisone in whichhactivists,
politicalgroupsoreven a country disruptsthe use of a
computerservicebyblockingtheserver'sabilitytorespondtoitscli
ents.
15.
16.
TRUE
17.
18.
FALSE
19.
TRUE
QUESTION 7
20. Essay 1Read theFiresheep case study (section 7.2.4, pages
325-328 in the 7th Edition) in thetextbook.
CarefullystudytheEthicalEvaluationofthe case,
thenanswerthefollowingquestion.Wasitethicalfor Eric Butler
todesign and releasetheFiresheepextension?
Takeintoaccountthesefactors, and be specificabouteachone,
butstateyourownopinion and analysis:
a. What he did
October 2010: Eric Butler released Firesheep extension to Firefox browser
Firesheep made it possible for ordinary computer users to easily sidejack Web sessions
b. Why he claims he didit
Firesheep made it possible for ordinary computer users to easily sidejack Web sessions
c. Theconsequencesofhisaction
More than 500,000 downloads in first week • Attracted great deal of media attention
d. TheethicalargumentsfromtheUtilitarian and Kantianperspectives.
Release of Firesheep led media to focus on security problem
Accessing someone else’s user account is an invasion of their privacy and is wrong
QUESTION 8
21. Essay2:Readthe Internet Worm case study (7.3.2, pages
330-335 in the 7th Edition) in thetextbook.
CarefullystudytheEthicalEvaluationofthe case,
thenanswerthefollowingquestion.Wasitethicalfor Robert
Tappan Morris Jr. todesign and launchwhatisnowreferredto
as The Internet Worm? Takeintoaccountthesefactors, and
be specificabouteachone, butstateyourownopinion and
analysis:
Robert Tappan Morris, Jr. – Graduate student at Cornell – Released worm onto Internet from MIT
computer • Effect of worm – Spread to significant numbers of Unix computers – Infected computers
kept crashing or became unresponsive – Took a day for fixes to be published • Impact on Morris –
Suspended from Cornell – 3 years’ probation + 400 hours community service – $150,000 in legal fees
and fines
e. What he did
f. Why he claims he didit
g. Theconsequencesofhisa...