a. What is the definition of hacking? 9a1.) Hacking is defined as using a computer resource without

Question:

a. What is the definition of hacking?

9a1.) Hacking is defined as using a computer resource without authorization or in excess of authorization.

a. True

b. False


9a2.) Which of the following meets the definition of hacking?

a. To intentionally use a computer resource without authorization

b. To intentionally use a computer on which you have an account but use it for unauthorized purposes

c. Both A and B

d. Neither A nor B


b. If you see a username and password on a sticky note on a monitor, is it hacking if you use this information to log in? Explain in terms of the definition. (Answer: Yes it is; you did not receive authorization to use it.)

9b.) If you see a username and password on a Post-It note that anyone can see on a monitor, is it hacking if you use this information to log in?

a. Yes

b. No

c. It cannot be determined from the information given.


c. You discover that you can get into other e-mail accounts after you have logged in under your account. You spend just a few minutes looking at another user’s mail. Is that hacking? Explain in terms of the definition.

9c.) You accidentally discover that you can get into other e-mail accounts after you have logged in under your account. You spend just a few minutes looking at another user's mail. Is that hacking?

a. Yes

b. No

c. It cannot be determined from the information given.


d. If you click on a link expecting to go to a legitimate website but are directed to a website that contains information you are not authorized to see, is that hacking? Explain in terms of the definition.

9d1.) You click on a link expecting to go to a legitimate website but are directed to a website that contains information you are not authorized to see. You exit without looking around. is that hacking?

a. Yes

b. No

c. It cannot be determined from the information given.


9d2.) You are concerned with the security of a site you use. You run a vulnerability test against it. The responses reveal a security threat. Is this hacking?

a. Yes

b. No

c. It cannot be determined from the information given.

Fantastic news! We've Found the answer you've been seeking!

Step by Step Answer:

Related Book For  book-img-for-question

Business Data Networks and Security

ISBN: 978-0134817125

11th Edition

Authors: Raymond R. Panko, Julia L. Panko

Question Posted: