AM
TEST OUT ETHICAL HACKER PRO FINAL REVIEW (PRACTICE QUESTIONS
AND ANSWERS 2026/2027 UPDATE.)
System log files You believe your system has been hacked. Which of
the following is the first thing you should check?
A black hat hacker Who would be most likely to erase only parts of the
system log files?
auditpol Phil, a hacker, has found his way into a secure
system. He is looking for a Windows utility he
can use to retrieve, set, back up, and restore
logging policies. Which of the following
utilities should he consider?
Hiding evidence Which of the following could a hacker use Alternate
Data Streams (ADS) for?
touch James, a hacker, has hacked into a Unix system and
wants to change the timestamps on some files to
hide his tracks. Which of the following timestamp
tools would he most likely use?
A tool that can remove files and clear Which of the following best describes CCleaner?
internet browsing history. It also
frees up hard disk space. It clears
the
temporary files, history, and cookies
from each of the six major search
engines.
Malicious alternate data streams Mark is moving files from a device that is formatted
https://quizlet.com/649625488/testout-ethical-hacker-pro-final-review-practice- 1/
questions-flash-cards/ 24
,3/2/26, 11:35
AM
using NFTS to a device that is formatted using FAT.
Which of the following is he trying to get rid of?
Can modify the operating system and Which of the following best describes a rootkit?
the utilities of the target system
Sirefef Which of the following is also known as ZeroAccess
and has virus, Trojan horse, and rootkit
components?
Integrity-based Jerry runs a tool to scan a clean system to create
a database. The tool then scans the system again
and compares the second scan to the clean
database. Which of the following detection
methods is Jerry using?
https://quizlet.com/649625488/testout-ethical-hacker-pro-final-review-practice- 2/
questions-flash-cards/ 24
, 3/2/26, 11:35
AM
Searches for execution path hooking, Which of the following best describes the heuristic
which allows a function value in an or behavior-based detection method?
accessible environment to be
changed
Stegtanography The method of embedding data into legitimate files
like graphics to hide it and then extracting the
data once it reaches its destination is called:
Steganography Cameron wants to send secret messages to his
friend Brandon, who works at a competitor's
company. To secure these message, he uses a
technique to hide a secret message within a video.
Which of the following techniques is he using?
A crypter can encrypt, obfuscate, The program shown is a crypter. Which of the
and manipulate malware to make following best defines what this program does?
it difficult to detect
CAN-SPAM Act Which of the following laws is designed to regulate
emails?
Logic bomb Which of the following virus types is shown in the
code below?
https://quizlet.com/649625488/testout-ethical-hacker-pro-final-review-practice- 3/
questions-flash-cards/ 24