2
Ethical Hacking Exam 1 (1-5) questions with precise detailed
|| || || || || || || || ||
answers
What is the main purpose of malware? - ✔✔Financial gain or destruction
|| || || || || || || || || || ||
A computer _________ relies on a host to propagate throughout a network. - ✔✔Virus
|| || || || || || || || || || || || ||
An exploit that attacks computer systems by inserting executable code in areas of memory
|| || || || || || || || || || || || || ||
because of poorly written code is called which of the following? - ✔✔Buffer overflow
|| || || || || || || || || || || || ||
Which of the following exploits might hide jit's destructive payload in a legitimate
|| || || || || || || || || || || || ||
application or game? - ✔✔Trojan program || || || || ||
Antivirus software should be updated annually. True or False? - ✔✔FALSE
|| || || || || || || || || ||
Which of the following doesn't attach itself to a host but can replicate itself? - ✔✔Worm
|| || || || || || || || || || || || || || ||
Which of the following is an example of a macro programming language? - ✔✔Visual Basic
|| || || || || || || || || || || || || || ||
for Applications
||
One purpose of adware is to determine users' purchasing habits True or False? - ✔✔TRUE
|| || || || || || || || || || || || || ||
List three types of malware. - ✔✔Virus, Worm, Trojan
|| || || || || || || ||
A software or hardware component that records each keystroke a user enters is called which
|| || || || || || || || || || || || || ||
of the following? - ✔✔Keylogger
|| || || || ||
,2
List three worms or viruses that use email as a form of attack. - ✔✔CryptoLocker,
|| || || || || || || || || || || || || || ||
Carbanak, Waledac ||
The Ping of Death is an exploit that sends multiple ICMP packets to a host faster than the
|| || || || || || || || || || || || || || || || || ||
host can handle. True or False? - ✔✔TRUE
|| || || || || || ||
What type of network attack relies on multiple servers participating in an attack on one
|| || || || || || || || || || || || || || ||
host system? - ✔✔Distributed denial-of-service attack
|| || || || ||
What component can be used to reduce the risk of a trojan program or rootkit sending
|| || || || || || || || || || || || || || || ||
information from an attacked computer to a remote host? - ✔✔Firewall || || || || || || || || || ||
To reduce the risk of a virus attack on a network, you should do which of the following? -
|| || || || || || || || || || || || || || || || || || ||
✔✔Use antivirus software. || || ||
Educate users about opening attachments from suspicious emails.
|| || || || || || || ||
Keep virus signature files current.
|| || || ||
-> All of the Above
|| || || ||
The base-64 numbering system uses ________ bits to represent a character. - ✔✔6
|| || || || || || || || || || || ||
An exploit that leaves an attacker with another way to compromise a network later is called
|| || || || || || || || || || || || || || || ||
which of the following? (Choose all that apply.) - ✔✔Backdoor
|| || || || || || || || ||
Rootkit
Which of the following is a good place to begin your search for vulnerabilities in Microsoft
|| || || || || || || || || || || || || || || ||
products? - ✔✔Microsoft security bulletins || || || ||
, 2
An exploit discovered for one OS might also be effective on another OS. True or False? -
|| || || || || || || || || || || || || || || || ||
✔✔TRUE
What are keyloggers? - ✔✔Software used to capture keystrokes on a computer.
|| || || || || || || || || || ||
How does a virus work? - ✔✔Attaches itself to a file or other program.
|| || || || || || || || || || || || ||
Why use a virus? - ✔✔You can use them for Phishing or Ransomware
|| || || || || || || || || || || ||
How does a worm work? - ✔✔Replicates and propagates without a host.
|| || || || || || || || || || ||
Why use a worm? - ✔✔Doesn't need a host and can possibly infect every computer in the
|| || || || || || || || || || || || || || || || ||
world in a short period of time.
|| || || || || ||
How does a Trojan work? - ✔✔Can disguise itself as a useful program and can install
|| || || || || || || || || || || || || || || ||
backdoors or rootkits. || ||
Why use a Trojan? - ✔✔Has the ability to disguise itself and can install backdoors.
|| || || || || || || || || || || || || ||
What is a good protection against Trojans? - ✔✔A good software or hardware firewall.
|| || || || || || || || || || || || ||
What is a Macro virus? - ✔✔A virus that's encoded as a macro in programs that support a
|| || || || || || || || || || || || || || || || || ||
programming language. ||
Why use a Macro virus? - ✔✔Easily created by non-programmers
|| || || || || || || || ||
Ethical Hacking Exam 1 (1-5) questions with precise detailed
|| || || || || || || || ||
answers
What is the main purpose of malware? - ✔✔Financial gain or destruction
|| || || || || || || || || || ||
A computer _________ relies on a host to propagate throughout a network. - ✔✔Virus
|| || || || || || || || || || || || ||
An exploit that attacks computer systems by inserting executable code in areas of memory
|| || || || || || || || || || || || || ||
because of poorly written code is called which of the following? - ✔✔Buffer overflow
|| || || || || || || || || || || || ||
Which of the following exploits might hide jit's destructive payload in a legitimate
|| || || || || || || || || || || || ||
application or game? - ✔✔Trojan program || || || || ||
Antivirus software should be updated annually. True or False? - ✔✔FALSE
|| || || || || || || || || ||
Which of the following doesn't attach itself to a host but can replicate itself? - ✔✔Worm
|| || || || || || || || || || || || || || ||
Which of the following is an example of a macro programming language? - ✔✔Visual Basic
|| || || || || || || || || || || || || || ||
for Applications
||
One purpose of adware is to determine users' purchasing habits True or False? - ✔✔TRUE
|| || || || || || || || || || || || || ||
List three types of malware. - ✔✔Virus, Worm, Trojan
|| || || || || || || ||
A software or hardware component that records each keystroke a user enters is called which
|| || || || || || || || || || || || || ||
of the following? - ✔✔Keylogger
|| || || || ||
,2
List three worms or viruses that use email as a form of attack. - ✔✔CryptoLocker,
|| || || || || || || || || || || || || || ||
Carbanak, Waledac ||
The Ping of Death is an exploit that sends multiple ICMP packets to a host faster than the
|| || || || || || || || || || || || || || || || || ||
host can handle. True or False? - ✔✔TRUE
|| || || || || || ||
What type of network attack relies on multiple servers participating in an attack on one
|| || || || || || || || || || || || || || ||
host system? - ✔✔Distributed denial-of-service attack
|| || || || ||
What component can be used to reduce the risk of a trojan program or rootkit sending
|| || || || || || || || || || || || || || || ||
information from an attacked computer to a remote host? - ✔✔Firewall || || || || || || || || || ||
To reduce the risk of a virus attack on a network, you should do which of the following? -
|| || || || || || || || || || || || || || || || || || ||
✔✔Use antivirus software. || || ||
Educate users about opening attachments from suspicious emails.
|| || || || || || || ||
Keep virus signature files current.
|| || || ||
-> All of the Above
|| || || ||
The base-64 numbering system uses ________ bits to represent a character. - ✔✔6
|| || || || || || || || || || || ||
An exploit that leaves an attacker with another way to compromise a network later is called
|| || || || || || || || || || || || || || || ||
which of the following? (Choose all that apply.) - ✔✔Backdoor
|| || || || || || || || ||
Rootkit
Which of the following is a good place to begin your search for vulnerabilities in Microsoft
|| || || || || || || || || || || || || || || ||
products? - ✔✔Microsoft security bulletins || || || ||
, 2
An exploit discovered for one OS might also be effective on another OS. True or False? -
|| || || || || || || || || || || || || || || || ||
✔✔TRUE
What are keyloggers? - ✔✔Software used to capture keystrokes on a computer.
|| || || || || || || || || || ||
How does a virus work? - ✔✔Attaches itself to a file or other program.
|| || || || || || || || || || || || ||
Why use a virus? - ✔✔You can use them for Phishing or Ransomware
|| || || || || || || || || || || ||
How does a worm work? - ✔✔Replicates and propagates without a host.
|| || || || || || || || || || ||
Why use a worm? - ✔✔Doesn't need a host and can possibly infect every computer in the
|| || || || || || || || || || || || || || || || ||
world in a short period of time.
|| || || || || ||
How does a Trojan work? - ✔✔Can disguise itself as a useful program and can install
|| || || || || || || || || || || || || || || ||
backdoors or rootkits. || ||
Why use a Trojan? - ✔✔Has the ability to disguise itself and can install backdoors.
|| || || || || || || || || || || || || ||
What is a good protection against Trojans? - ✔✔A good software or hardware firewall.
|| || || || || || || || || || || || ||
What is a Macro virus? - ✔✔A virus that's encoded as a macro in programs that support a
|| || || || || || || || || || || || || || || || || ||
programming language. ||
Why use a Macro virus? - ✔✔Easily created by non-programmers
|| || || || || || || || ||