Which of the following describes an instance of legal hacking?(2 points) Responses Grey hat hacking Grey hat hacking Looking for security risks on a product that is excluded from a bug bounty program. Looking for security risks on a product that is excluded from a bug bounty program. Penetration testing for a company. Penetration testing for a company. Security hacking is never legal. Security hacking is never legal. Question 2 What is NOT true of white hat hackers?(2 points) Responses They contribute to robust security systems. They contribute to robust security systems. They are breaking the law and are at risk of legal repercussions. They are breaking the law and are at risk of legal repercussions. They alert companies of security vulnerabilities. They alert companies of security vulnerabilities. They use the same methods as black hat hackers. They use the same methods as black hat hackers. Question 3 It is legal to practice hacking websites as long as you are a student learning about cybersecurity.(2 points) Responses True True False False Question 4 Alice is buying books from an online retail site, and she finds that she is able to change the price of a book from $19.99 to $1.99. Which part of the CIA triad has been broken? (2 points) Responses Confidentiality Confidentiality Integrity Integrity Availability Availability Question 5 In cybersecurity, what does CIA stand for?(2 points) Responses Confidentiality, Integrity, Availability Confidentiality, Integrity, Availability Cybersecurity, Internet, Accessibility Cybersecurity, Internet, Accessibility Cybersecurity Investigation Agency Cybersecurity Investigation Agency Central Intelligence Agency Central Intelligence Agency Question 6 Which of the following are best practices for having a secure password?(2 points) Responses Creating a password that is long in length. Creating a password that is long in length. Creating a password that has a combination of letters, numbers, and special characters. Creating a password that has a combination of letters, numbers, and special characters. Using a password manager. Using a password manager. All of the above. All of the above. Question 7 By checking the box on a privacy policy page, a company can legally use your data and information in all the ways disclosed, no matter what.(2 points) Responses True- This is always the case. True- This is always the case. False- It depends if the privacy policy allows you to opt in or out of sharing data. False- It depends if the privacy policy allows you to opt in or out of sharing data.

1 answer

Here are the answers to the questions you've provided:

Question 1: Which of the following describes an instance of legal hacking?

  • Response: Penetration testing for a company.
    (Penetration testing is a legal and authorized activity aimed at finding security vulnerabilities with the permission of the company.)

Question 2: What is NOT true of white hat hackers?

  • Response: They are breaking the law and are at risk of legal repercussions.
    (White hat hackers operate legally and ethically, assisting organizations in improving their security.)

Question 3: It is legal to practice hacking websites as long as you are a student learning about cybersecurity.

  • Response: False
    (Practicing hacking on websites you do not own or do not have permission to test is illegal, regardless of educational status.)

Question 4: Alice is buying books from an online retail site, and she finds that she is able to change the price of a book from $19.99 to $1.99. Which part of the CIA triad has been broken?

  • Response: Integrity
    (The ability to change the price suggests a breach in the integrity of the system, as the price displayed is no longer accurate.)

Question 5: In cybersecurity, what does CIA stand for?

  • Response: Confidentiality, Integrity, Availability
    (This is the correct meaning of the CIA triad in cybersecurity.)

Question 6: Which of the following are best practices for having a secure password?

  • Response: All of the above.
    (All mentioned practices contribute to creating a safe and secure password.)

Question 7: By checking the box on a privacy policy page, a company can legally use your data and information in all the ways disclosed, no matter what.

  • Response: False- It depends if the privacy policy allows you to opt in or out of sharing data.
    (Privacy policies must adhere to regulations and the user's consent can vary based on the terms included within the policy.)

Feel free to ask if you need further assistance or clarification on any of the questions!