Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

Ethical Hacking Essentials (Module 2-Ethical Hacking Fundamentals) Exam with verified detailed answers

Rating
-
Sold
-
Pages
15
Grade
A+
Uploaded on
26-01-2026
Written in
2025/2026

Ethical Hacking Essentials (Module 2-Ethical Hacking Fundamentals) Exam with verified detailed answers

Institution
Ethical Hacking
Course
Ethical Hacking

Content preview

2



Ethical Hacking Essentials (Module 2-Ethical Hacking Fundamentals)
|| || || || || || ||




Exam with verified detailed answers
|| || || ||




What is the Cyber Kill Chain Methodology? - ✔✔A component of intelligence-driven
|| || || || || || || || || || || ||




defense for the identification and prevention of malicious intrusion activities. This
|| || || || || || || || || || ||




methodology helps security professionals in identifying the steps that adversaries follow in
|| || || || || || || || || || || ||




order to accomplish their goals. The cyber kill chain is a framework developed for securing
|| || || || || || || || || || || || || || ||




cyberspace based on the concept of military kill chains. This method aims to actively
|| || || || || || || || || || || || || ||




enhance intrusion detection and response.
|| || || ||




Define Reconnaissance - ✔✔First phase of the seven where an adversary collects as much
|| || || || || || || || || || || || || ||




information about the target as possible to probe for weak points before actually attacking.
|| || || || || || || || || || || || || ||




They look for information such as publicly available information on the Internet, network
|| || || || || || || || || || || || ||




information, system information, and the organizational information of the target.
|| || || || || || || || ||




Activities of the adversary include the following:
|| || || || || || ||




-Gathering information about the target organization by searching the Internet or through
|| || || || || || || || || || || ||




social engineering
|| ||




-Performing analysis of various online activities and publicly available information
|| || || || || || || || || ||




-Gathering information from social networking sites and web services
|| || || || || || || || ||




-Obtaining information about websites visited || || || || ||




-Monitoring and analyzing the target organization's website
|| || || || || || ||




-Performing Whois, DNS, and network footprinting || || || || || ||




-Performing scanning to identify open ports and services || || || || || || ||




Define Weaponization - ✔✔Second phase of the seven-Based on the vulnerabilities
|| || || || || || || || || || ||




identified during analysis, the adversary selects or creates a tailored deliverable malicious
|| || || || || || || || || || || ||




payload (remote-access malware weapon) using an exploit and a backdoor to send it to the
|| || || || || || || || || || || || || || ||

, 2


victim. An adversary may target specific network devices, operating systems, endpoint
|| || || || || || || || || || ||




devices, or even individuals within the organization to carry out their attack.
|| || || || || || || || || || ||




Activities of the adversary include the following:
|| || || || || ||




-Identifying appropriate malware payload based on the analysis
|| || || || || || || ||




-Creating a new malware payload or selecting, reusing, modifying the available malware
|| || || || || || || || || || || ||




payloads based on the identified vulnerability
|| || || || || ||




-Creating a phishing email campaign || || || || ||




-Leveraging exploit kits and botnets || || || ||




Define Delivery - ✔✔Third phase of the seven- A key stage that measures the effectiveness
|| || || || || || || || || || || || || || ||




of the defense strategies implemented by the target organization based on whether the
|| || || || || || || || || || || || ||




intrusion attempt of the adversary is blocked or not.
|| || || || || || || ||




Activities of the adversary include the following:
|| || || || || ||




-Sending phishing emails to employees of the target organization
|| || || || || || || || ||




-Distributing USB drives containing malicious payload to employees of the target
|| || || || || || || || || || ||




organization ||




-Performing attacks such as watering hole on the compromised website
|| || || || || || || || || ||




-Implementing various hacking tools against the operating systems, applications, and
|| || || || || || || || || ||




servers of the target organization
|| || || ||




Define Exploitation - ✔✔Fourth phase of the seven-Triggers the adversary's malicious code
|| || || || || || || || || || || ||




to exploit a vulnerability in the operating system, application, or server on a target system.
|| || || || || || || || || || || || || || ||




At this stage, the organization may face threats such as authentication and authorization
|| || || || || || || || || || || || ||




attacks, arbitrary code execution, physical security threats, and security misconfiguration.
|| || || || || || || || ||




Define Installation - ✔✔Fifth phase of the seven-The adversary downloads and installs
|| || || || || || || || || || || ||




more malicious software on the target system to maintain access to the target network for
|| || || || || || || || || || || || || || ||

Written for

Institution
Ethical Hacking
Course
Ethical Hacking

Document information

Uploaded on
January 26, 2026
Number of pages
15
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$18.49
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Ruiz Liberty University
Follow You need to be logged in order to follow users or courses
Sold
96
Member since
1 year
Number of followers
1
Documents
13904
Last sold
2 weeks ago
Top-Quality Study Materials for Success – Ace Your Exams with Expert Resources!

Access high-quality study materials to help you excel in your exams. Get notes, summaries, and guides tailored to your courses!

3.2

15 reviews

5
4
4
4
3
2
2
1
1
4

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions