Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

Ethical Hacking Exam 1 (1-5) questions with precise detailed answers

Rating
-
Sold
-
Pages
16
Grade
A+
Uploaded on
26-01-2026
Written in
2025/2026

Ethical Hacking Exam 1 (1-5) questions with precise detailed answers

Institution
Ethical Hacking
Course
Ethical Hacking

Content preview

2



Ethical Hacking Exam 1 (1-5) questions with precise detailed
|| || || || || || || || ||




answers


What is the main purpose of malware? - ✔✔Financial gain or destruction
|| || || || || || || || || || ||




A computer _________ relies on a host to propagate throughout a network. - ✔✔Virus
|| || || || || || || || || || || || ||




An exploit that attacks computer systems by inserting executable code in areas of memory
|| || || || || || || || || || || || || ||




because of poorly written code is called which of the following? - ✔✔Buffer overflow
|| || || || || || || || || || || || ||




Which of the following exploits might hide jit's destructive payload in a legitimate
|| || || || || || || || || || || || ||




application or game? - ✔✔Trojan program || || || || ||




Antivirus software should be updated annually. True or False? - ✔✔FALSE
|| || || || || || || || || ||




Which of the following doesn't attach itself to a host but can replicate itself? - ✔✔Worm
|| || || || || || || || || || || || || || ||




Which of the following is an example of a macro programming language? - ✔✔Visual Basic
|| || || || || || || || || || || || || || ||




for Applications
||




One purpose of adware is to determine users' purchasing habits True or False? - ✔✔TRUE
|| || || || || || || || || || || || || ||




List three types of malware. - ✔✔Virus, Worm, Trojan
|| || || || || || || ||




A software or hardware component that records each keystroke a user enters is called which
|| || || || || || || || || || || || || ||




of the following? - ✔✔Keylogger
|| || || || ||

,2




List three worms or viruses that use email as a form of attack. - ✔✔CryptoLocker,
|| || || || || || || || || || || || || || ||




Carbanak, Waledac ||




The Ping of Death is an exploit that sends multiple ICMP packets to a host faster than the
|| || || || || || || || || || || || || || || || || ||




host can handle. True or False? - ✔✔TRUE
|| || || || || || ||




What type of network attack relies on multiple servers participating in an attack on one
|| || || || || || || || || || || || || || ||




host system? - ✔✔Distributed denial-of-service attack
|| || || || ||




What component can be used to reduce the risk of a trojan program or rootkit sending
|| || || || || || || || || || || || || || || ||




information from an attacked computer to a remote host? - ✔✔Firewall || || || || || || || || || ||




To reduce the risk of a virus attack on a network, you should do which of the following? -
|| || || || || || || || || || || || || || || || || || ||




✔✔Use antivirus software. || || ||




Educate users about opening attachments from suspicious emails.
|| || || || || || || ||




Keep virus signature files current.
|| || || ||




-> All of the Above
|| || || ||




The base-64 numbering system uses ________ bits to represent a character. - ✔✔6
|| || || || || || || || || || || ||




An exploit that leaves an attacker with another way to compromise a network later is called
|| || || || || || || || || || || || || || || ||




which of the following? (Choose all that apply.) - ✔✔Backdoor
|| || || || || || || || ||




Rootkit



Which of the following is a good place to begin your search for vulnerabilities in Microsoft
|| || || || || || || || || || || || || || || ||




products? - ✔✔Microsoft security bulletins || || || ||

, 2


An exploit discovered for one OS might also be effective on another OS. True or False? -
|| || || || || || || || || || || || || || || || ||




✔✔TRUE



What are keyloggers? - ✔✔Software used to capture keystrokes on a computer.
|| || || || || || || || || || ||




How does a virus work? - ✔✔Attaches itself to a file or other program.
|| || || || || || || || || || || || ||




Why use a virus? - ✔✔You can use them for Phishing or Ransomware
|| || || || || || || || || || || ||




How does a worm work? - ✔✔Replicates and propagates without a host.
|| || || || || || || || || || ||




Why use a worm? - ✔✔Doesn't need a host and can possibly infect every computer in the
|| || || || || || || || || || || || || || || || ||




world in a short period of time.
|| || || || || ||




How does a Trojan work? - ✔✔Can disguise itself as a useful program and can install
|| || || || || || || || || || || || || || || ||




backdoors or rootkits. || ||




Why use a Trojan? - ✔✔Has the ability to disguise itself and can install backdoors.
|| || || || || || || || || || || || || ||




What is a good protection against Trojans? - ✔✔A good software or hardware firewall.
|| || || || || || || || || || || || ||




What is a Macro virus? - ✔✔A virus that's encoded as a macro in programs that support a
|| || || || || || || || || || || || || || || || || ||




programming language. ||




Why use a Macro virus? - ✔✔Easily created by non-programmers
|| || || || || || || || ||

Written for

Institution
Ethical Hacking
Course
Ethical Hacking

Document information

Uploaded on
January 26, 2026
Number of pages
16
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$19.99
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Ruiz Liberty University
Follow You need to be logged in order to follow users or courses
Sold
96
Member since
1 year
Number of followers
1
Documents
13904
Last sold
2 weeks ago
Top-Quality Study Materials for Success – Ace Your Exams with Expert Resources!

Access high-quality study materials to help you excel in your exams. Get notes, summaries, and guides tailored to your courses!

3.2

15 reviews

5
4
4
4
3
2
2
1
1
4

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions