FREE! Click here to Join FunTrivia. Thousands of games, quizzes, and lots more!
Quiz about Cyber Criminals
Quiz about Cyber Criminals

Cyber Criminals Trivia Quiz


Here are some questions regarding a few of the more prominent people in the annals of computer crime.

A multiple-choice quiz by christopherm. Estimated time: 4 mins.
  1. Home
  2. »
  3. Quizzes
  4. »
  5. People Trivia
  6. »
  7. Criminals
  8. »
  9. Felons & Criminals

Author
christopherm
Time
4 mins
Type
Multiple Choice
Quiz #
302,441
Updated
Dec 03 21
# Qns
10
Difficulty
Average
Avg Score
6 / 10
Plays
524
Awards
Top 20% Quiz
Last 3 plays: Guest 73 (8/10), Guest 73 (7/10), Guest 70 (5/10).
- -
Question 1 of 10
1. Adrian achieved some notoriety after breaching the security of the "New York Times" and a variety of other companies, including Microsoft. He appears in the film "Hackers Wanted", narrated by Kevin Spacey. What is his last name? Hint


Question 2 of 10
2. What is the name, or names, of the computer program that Robert Tappan Morris unleashed on the internet in late 1988? Hint


Question 3 of 10
3. Kevin Poulsen was a contemporary of Kevin Mitnick and achieved a large measure of attention with his hacking exploits. What was his nickname or "handle?" Hint


Question 4 of 10
4. This somewhat legendary former "phone phreaker", also known as Captain Crunch, originally built devices capable of manipulating the phone system. What is his name? Hint


Question 5 of 10
5. Bill Landreth ("the Cracker") was a member of a fairly exclusive computer hacker club. He, as many others have done, left those days behind for a career in computer security. What was the name of his club? ("Bad Boys") Hint


Question 6 of 10
6. This former member of the "Legion of Doom" and "Masters of Deception" computer clubs received a great deal of media attention, largely due to the comparatively harsh sentence that he received for his computer crimes. His nickname was, "Phiber Optik". What is his real name? Hint


Question 7 of 10
7. Many former computer hackers have gone on to better things. However, this story ended sadly. He holds the dubious distinction of being the first minor to be imprisoned for his computer crimes. What is his name? Hint


Question 8 of 10
8. David L. Smith is the author of the "Melissa worm", a destructive macro virus which is spread through email attachments. From which popular animated show, did Smith adopt one of his pseudonyms? (kwyjibo) Hint


Question 9 of 10
9. A prolific writer and former member of the hacker club called the "Legion of Doom", Loyd Blankenship authored which of the following works? Hint


Question 10 of 10
10. Nahshon Even-Chaim is one of the central figures portrayed in the film "In the Realm of the Hackers" (2002) He was one of the first to be arrested and sentenced in his country for computer crimes. Which country is he from? Hint



(Optional) Create a Free FunTrivia ID to save the points you are about to earn:

arrow Select a User ID:
arrow Choose a Password:
arrow Your Email:




Most Recent Scores
Apr 18 2024 : Guest 73: 8/10
Apr 10 2024 : Guest 73: 7/10
Apr 04 2024 : Guest 70: 5/10

Score Distribution

quiz
Quiz Answer Key and Fun Facts
1. Adrian achieved some notoriety after breaching the security of the "New York Times" and a variety of other companies, including Microsoft. He appears in the film "Hackers Wanted", narrated by Kevin Spacey. What is his last name?

Answer: Lamo

Adrian Lamo has since retired from the "dark side" of computing. He spent some time as a successful and award winning journalist. In an anecdote reminiscent of the hacker character, portrayed in the film "Swordfish" by Hugh Jackman, Lamo infiltrated the NBC network, on camera, in less than five minutes. Consequently, NBC canceled his scheduled spot with Tom Brokaw.
2. What is the name, or names, of the computer program that Robert Tappan Morris unleashed on the internet in late 1988?

Answer: All of these

Some years after the worm incident, Morris ironically, became a professor at MIT, from where his famous, or infamous internet worm was initially dispatched. Intentional or not, the worm rapidly spread across the internet, affecting Unix-based network servers, for the most part. As the worm replicated, networks ground to a halt.
3. Kevin Poulsen was a contemporary of Kevin Mitnick and achieved a large measure of attention with his hacking exploits. What was his nickname or "handle?"

Answer: Dark Dante

Kevin Poulsen's online persona was "Dark Dante". Poulsen is the subject of a book by Jonathan Littman entitled "The Watchman: The Twisted Life and Crimes of Serial Hacker Kevin Poulsen". In one of Poulsen's earlier escapades, he engineered the phone lines of a radio station, in order to become the 102nd caller, in a "Win a Porsche by Friday" contest, thus ensuring that he would win the prize offered.

He went on to become a senior editor at "Wired News".
4. This somewhat legendary former "phone phreaker", also known as Captain Crunch, originally built devices capable of manipulating the phone system. What is his name?

Answer: John Draper

It is said that John Draper had a friend who introduced John Draper to the existence of a seemingly innocuous whistle, found in boxes of Cap'n Crunch cereal. Draper was a talented programmer and engineer, who later created a word processor for Apple, called "EasyWriter".
5. Bill Landreth ("the Cracker") was a member of a fairly exclusive computer hacker club. He, as many others have done, left those days behind for a career in computer security. What was the name of his club? ("Bad Boys")

Answer: Inner Circle

Bill Landreth was arrested by the FBI while still a minor. Since then he has moved into computer security. He authored the book entitled "Out of the Inner Circle: A Hacker's Guide to Computer Security". "Bad Boys" is a reference to the song of the same name, performed by the Reggae group called "The Inner Circle."
6. This former member of the "Legion of Doom" and "Masters of Deception" computer clubs received a great deal of media attention, largely due to the comparatively harsh sentence that he received for his computer crimes. His nickname was, "Phiber Optik". What is his real name?

Answer: Mark Abene

Mark Abene is prominently featured in the book entitled "Masters of Deception: The Gang that Ruled Cyberspace" by Michelle Slatalla and Joshua Quittner. One of Abene's acts, along with his fellow club members, was the display of the following message on WNET: "Happy Thanksgiving you turkeys from all of us at MOD".
7. Many former computer hackers have gone on to better things. However, this story ended sadly. He holds the dubious distinction of being the first minor to be imprisoned for his computer crimes. What is his name?

Answer: Jonathan James

Jonathan Joseph James infiltrated highly sensitive U.S. government computers, including those of NASA and the Department of Defense. Jonathan James said this in an interview with "Frontline": "I certainly learned that there's a serious lack of computer security. If there's a will, there's a way, and if a computer enthusiast such as myself was determined to get into anywhere, be it the Pentagon or Microsoft, it's been demonstrated that it's possible and they will do it. And there's next to nothing they can do about it, because there's people with skill out there, and they'll get what they want." He sadly passed away in May of 2008.
8. David L. Smith is the author of the "Melissa worm", a destructive macro virus which is spread through email attachments. From which popular animated show, did Smith adopt one of his pseudonyms? (kwyjibo)

Answer: The Simpsons

In an episode from the first season of "The Simpsons" Bart lazily lays down all of his tiles in random order, spelling the word "kwyjibo." In a message left on one of the computers Smith had penetrated he wrote: "twenty-two, plus triple-word score, plus fifty points for using all my letters. Game's over. I'm outta here." Smith later cooperated with the FBI and his sentence was reduced.
9. A prolific writer and former member of the hacker club called the "Legion of Doom", Loyd Blankenship authored which of the following works?

Answer: The Conscience of a Hacker (Hacker Manifesto)

Blankenship wrote an essay "The Conscience of a Hacker" in the early part of 1986. It reached a wide audience and it was also noted in the film "Hackers". Blankenship also appears, as the "Mentor," in a documentary entitled "BBS: The Documentary". In an interview, Blankenship offered this advice for young hacker aspirants: "If you're going to break into computers, be careful out there. You're most likely gonna get caught, and it sucks. There is so much you can do legally (learn Linux & programming, for instance) that I'd recommend starting with that."
10. Nahshon Even-Chaim is one of the central figures portrayed in the film "In the Realm of the Hackers" (2002) He was one of the first to be arrested and sentenced in his country for computer crimes. Which country is he from?

Answer: Australia

Nahshon Even-Chaim, also known as "Phoenix", broke into a number of prominent research facilities, including NASA and Lawrence Livermore National Laboratory. He belonged to a club located in Melbourne, Australia. He apparently had run-ins with prominent figures in the computer security field.

He said, "It used to be the security guys chasing the hackers. Now, it's the hackers chasing the security guys." The pursuit and apprehension of Evan-Chaim is detailed in "Hackers: The Hunt for Australia's Most Infamous Computer Cracker".
Source: Author christopherm

This quiz was reviewed by FunTrivia editor gtho4 before going online.
Any errors found in FunTrivia content are routinely corrected through our feedback system.
4/25/2024, Copyright 2024 FunTrivia, Inc. - Report an Error / Contact Us