Which of the following describes an instance of legal hacking?(2 points)

Responses

Grey hat hacking
Grey hat hacking

Penetration testing for a company.
Penetration testing for a company.

Looking for security risks on a product that is excluded from a bug bounty program.
Looking for security risks on a product that is excluded from a bug bounty program.

Security hacking is never legal.
Security hacking is never legal.
Question 2
What is NOT true of white hat hackers?(2 points)
Responses

They are breaking the law and are at risk of legal repercussions.
They are breaking the law and are at risk of legal repercussions.

They use the same methods as black hat hackers.
They use the same methods as black hat hackers.

They alert companies of security vulnerabilities.
They alert companies of security vulnerabilities.

They contribute to robust security systems.
They contribute to robust security systems.
Question 3
It is legal to practice hacking websites as long as you are a student learning about cybersecurity.(2 points)
Responses

True
True

False
False
Question 4
Alice is buying books from an online retail site, and she finds that she is able to change the price of a book from $19.99 to $1.99.

Which part of the CIA triad has been broken?

(2 points)
Responses

Confidentiality
Confidentiality

Integrity
Integrity

Availability
Availability
Question 5
In cybersecurity, what does CIA stand for?(2 points)
Responses

Cybersecurity Investigation Agency
Cybersecurity Investigation Agency

Central Intelligence Agency
Central Intelligence Agency

Cybersecurity, Internet, Accessibility
Cybersecurity, Internet, Accessibility

Confidentiality, Integrity, Availability
Confidentiality, Integrity, Availability
Question 6
Which of the following are best practices for having a secure password?(2 points)
Responses

Creating a password that is long in length.
Creating a password that is long in length.

Creating a password that has a combination of letters, numbers, and special characters.
Creating a password that has a combination of letters, numbers, and special characters.

Using a password manager.
Using a password manager.

All of the above.
All of the above.
Question 7
By checking the box on a privacy policy page, a company can legally use your data and information in all the ways disclosed, no matter what.(2 points)
Responses

True- This is always the case.
True- This is always the case.

False- It depends if the privacy policy allows you to opt in or out of sharing data.

False- It depends if the privacy policy allows you to opt in or out of sharing data.