Here are the answers to the questions you've provided:
Question 1: Which of the following describes an instance of legal hacking?
- Response: Penetration testing for a company.
(Penetration testing is a legal and authorized activity aimed at finding security vulnerabilities with the permission of the company.)
Question 2: What is NOT true of white hat hackers?
- Response: They are breaking the law and are at risk of legal repercussions.
(White hat hackers operate legally and ethically, assisting organizations in improving their security.)
Question 3: It is legal to practice hacking websites as long as you are a student learning about cybersecurity.
- Response: False
(Practicing hacking on websites you do not own or do not have permission to test is illegal, regardless of educational status.)
Question 4: Alice is buying books from an online retail site, and she finds that she is able to change the price of a book from $19.99 to $1.99. Which part of the CIA triad has been broken?
- Response: Integrity
(The ability to change the price suggests a breach in the integrity of the system, as the price displayed is no longer accurate.)
Question 5: In cybersecurity, what does CIA stand for?
- Response: Confidentiality, Integrity, Availability
(This is the correct meaning of the CIA triad in cybersecurity.)
Question 6: Which of the following are best practices for having a secure password?
- Response: All of the above.
(All mentioned practices contribute to creating a safe and secure password.)
Question 7: By checking the box on a privacy policy page, a company can legally use your data and information in all the ways disclosed, no matter what.
- Response: False- It depends if the privacy policy allows you to opt in or out of sharing data.
(Privacy policies must adhere to regulations and the user's consent can vary based on the terms included within the policy.)
Feel free to ask if you need further assistance or clarification on any of the questions!