Cyber Security Questions and Answers – Ethical Hacking – History
This set of Cyber Security Multiple Choice Questions & Answers (MCQs) focuses on “Ethical Hacking – History”.
1. In which year the term hacking was coined?
Explanation: The term came to origin in the year 1960s when very highly skilled professionals and individuals practice complex programming approaches to solve different problems.
2. From where the term ‘hacker’ first came to existence?
b) Stanford University
d) Bell’s Lab
Explanation: At MIT (Massachusetts Institute of Technology), the term ‘hacker’ first came into origin because individuals and high skilled professionals solve different problems using programming languages. Some similar terms were also coined in this regard such as – geeks & nerds.
3. What is the one thing that old hackers were fond of or find interests in?
a) Breaking Other’s system
b) Voracious thirst for knowledge
c) Cracking Phone calls
d) Learning new languages
Explanation: Hackers of the old era were considered the most influential individuals of society with intellectual learning inclination and thirst for knowledge.
4. In which year the first popular hacker conference took place?
Explanation: The first ever internationally recognized hacker’s conference took place in the year 1993 at Las Vegas, Nevada.
5. What is the name of the first hacker’s conference?
Explanation: DEFCON is one of the most popular and largest hacker’s as well as a security consultant’s conference that takes place every year in Las Vegas, Nevada, where government agents, security professionals, black and white hat hackers from all over the world attend that conference.
6. _______ is the oldest phone hacking techniques used by hackers to make free calls
Explanation: Phreaking which is abbreviated as phone-hacking is a slang term and old hacking technique where skilled professionals study, explore & experiment telephone networks in order to acquire the free calling facility.
7. In which year, first practical technology hacking came into origin?
Explanation: The first hacking (related to telephone technology) was done when the phone company – named Bell Telephone started in the year 1878.
8. In which year, hacking became a practical crime and a matter of concern in the field of technology?
Explanation: For hackers 1970 was that era when hackers and cyber criminals figured out how wired technologies work and how these technologies can be exploited in order to gain additional advantage or misuse the technology.
9. Who was the first individual who performed a major hacking in the year 1971?
a) Steve Wozniak
b) Steve Jobs
c) Kevin Mitnick
d) John Draper
Explanation: In the year 1971, a Vietnam guy name John Draper figured it out as how to make phone calls free of cost. This type of phone hacking is termed Phreaking.
10. Name the hacker who breaks the ARPANET systems?
a) Jon von Neumann
b) Kevin Poulsen
c) Kevin Mitnick
d) John Draper
Explanation: The ARPANET (Advanced Research Project Agency Network) got hacked by Kevin Poulsen as he breaks into the Pentagon network and their associated system but got caught immediately in the year 1983.
11. Who coined the term “cyberspace”?
a) Andrew Tannenbaum
b) Scott Fahlman
c) William Gibson
d) Richard Stallman
Explanation: In the year 1821, an American – Canadian fiction pioneer cum writer, William Gibson explored the different streams of technologies and coined the term “cyberspace”. The term defines interconnected technologies that help in sharing information, interact with digital devices, storage and digital entertainment, computer and network security and stuff related to information technology.
12. In which year computer scientists try to integrate encryption techniques in TCP/IP protocol?
Explanation: TCP/IP suite needs prior security as it is one of the most popularly used protocol suites and hence some computer scientists in the year 1978, attempts to integrate the security algorithms though they face many impediments in this regard.
13. In which year the Computer Fraud & Abuse Act was adopted in the United States?
Explanation: This Cyber security bill got passed in the US in the year 1984 keeping this in concern that any computer related crimes do not go unpunished. This law also restricts users from unauthorized access of computer or data associated with it.
14. Who was the first individual to distribute computer worms through internet?
a) Vladimir Levin
b) Bill Landreth
c) Richard Stallman
d) Robert T. Morris
Explanation: Robert Tappan Morris, a Cornell University graduate student developed Morris Worm in 1988 and was accused of the crime (under US Computer Fraud and Abuse Act.) for spreading computer worms through Internet.
15. _____ is a powerful encryption tool released by Philip Zimmerman in the year 1991.
a) PGP (Protected Good Privacy)
b) AES (Advanced Encryption Standard)
c) PGP (Pretty Good Privacy)
d) DES (Data Encryption Standard)
Explanation: This encryption program package name PGP (Pretty Good Privacy) became popular across the globe because it helps in providing authentication in data communication as well as help in maintaining privacy through cryptographic algorithms by encryption & decryption of plain texts (in emails and files) to cipher texts and vice versa.