ETHICAL HACKING FINAL EXAM (2025 EDITION) –
COMPLETE CYBERSECURITY ASSESSMENT &
VERIFIED SOLUTIONS
What TCP/IP protocol is fast, unreliable, and operates at the Transport layer?
UDP
What type of network attack relies on guessing a TCP header's initial sequence number of
ISN?
ARP Spoofing?
In a buffer overflow attack, an attacker finds a vulnerability in poorly written code that
does't check for a defined amount of memory space use
true
What layer, in the TCP/IP protocol stack, is responsible for encapsulating data into
segments?
Transport layer
What connection-oriented protocol is utilized by the Transport layer?
TCP
EDUCATIONAL SUPPORT • ACADEMIC RESOURCES • PROFESSIONAL GUIDANCE
, MINDPLUG SOLUTIONS — EMPOWERING MINDS, BUILDING FUTURES
What TCP flag is responsible of synchronizing the beginning of a session?
SYN flag
What 32-bit number tracks packets received by a node and allows the reassembling of
large packets that have been broken up into smaller packets?
UDP?
What common term is used by security testing professionals to describe vulnerabilities in a
network?
holes
What IP address is used as a loopback address and is not a valid IP address that can be
assigned to a network?
127 address
How many host computers can be assigned a valid IPv4 address when using CIDR/24
prefix?
254
What is the decimal equivalent of the binary number 11000001
164,193,201?
EDUCATIONAL SUPPORT • ACADEMIC RESOURCES • PROFESSIONAL GUIDANCE