Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

Ethical Hacking Exam 1 (1-5) questions with precise detailed answers

Beoordeling
-
Verkocht
-
Pagina's
16
Cijfer
A+
Geüpload op
26-01-2026
Geschreven in
2025/2026

Ethical Hacking Exam 1 (1-5) questions with precise detailed answers

Instelling
Ethical Hacking
Vak
Ethical Hacking

Voorbeeld van de inhoud

2



Ethical Hacking Exam 1 (1-5) questions with precise detailed
|| || || || || || || || ||




answers


What is the main purpose of malware? - ✔✔Financial gain or destruction
|| || || || || || || || || || ||




A computer _________ relies on a host to propagate throughout a network. - ✔✔Virus
|| || || || || || || || || || || || ||




An exploit that attacks computer systems by inserting executable code in areas of memory
|| || || || || || || || || || || || || ||




because of poorly written code is called which of the following? - ✔✔Buffer overflow
|| || || || || || || || || || || || ||




Which of the following exploits might hide jit's destructive payload in a legitimate
|| || || || || || || || || || || || ||




application or game? - ✔✔Trojan program || || || || ||




Antivirus software should be updated annually. True or False? - ✔✔FALSE
|| || || || || || || || || ||




Which of the following doesn't attach itself to a host but can replicate itself? - ✔✔Worm
|| || || || || || || || || || || || || || ||




Which of the following is an example of a macro programming language? - ✔✔Visual Basic
|| || || || || || || || || || || || || || ||




for Applications
||




One purpose of adware is to determine users' purchasing habits True or False? - ✔✔TRUE
|| || || || || || || || || || || || || ||




List three types of malware. - ✔✔Virus, Worm, Trojan
|| || || || || || || ||




A software or hardware component that records each keystroke a user enters is called which
|| || || || || || || || || || || || || ||




of the following? - ✔✔Keylogger
|| || || || ||

,2




List three worms or viruses that use email as a form of attack. - ✔✔CryptoLocker,
|| || || || || || || || || || || || || || ||




Carbanak, Waledac ||




The Ping of Death is an exploit that sends multiple ICMP packets to a host faster than the
|| || || || || || || || || || || || || || || || || ||




host can handle. True or False? - ✔✔TRUE
|| || || || || || ||




What type of network attack relies on multiple servers participating in an attack on one
|| || || || || || || || || || || || || || ||




host system? - ✔✔Distributed denial-of-service attack
|| || || || ||




What component can be used to reduce the risk of a trojan program or rootkit sending
|| || || || || || || || || || || || || || || ||




information from an attacked computer to a remote host? - ✔✔Firewall || || || || || || || || || ||




To reduce the risk of a virus attack on a network, you should do which of the following? -
|| || || || || || || || || || || || || || || || || || ||




✔✔Use antivirus software. || || ||




Educate users about opening attachments from suspicious emails.
|| || || || || || || ||




Keep virus signature files current.
|| || || ||




-> All of the Above
|| || || ||




The base-64 numbering system uses ________ bits to represent a character. - ✔✔6
|| || || || || || || || || || || ||




An exploit that leaves an attacker with another way to compromise a network later is called
|| || || || || || || || || || || || || || || ||




which of the following? (Choose all that apply.) - ✔✔Backdoor
|| || || || || || || || ||




Rootkit



Which of the following is a good place to begin your search for vulnerabilities in Microsoft
|| || || || || || || || || || || || || || || ||




products? - ✔✔Microsoft security bulletins || || || ||

, 2


An exploit discovered for one OS might also be effective on another OS. True or False? -
|| || || || || || || || || || || || || || || || ||




✔✔TRUE



What are keyloggers? - ✔✔Software used to capture keystrokes on a computer.
|| || || || || || || || || || ||




How does a virus work? - ✔✔Attaches itself to a file or other program.
|| || || || || || || || || || || || ||




Why use a virus? - ✔✔You can use them for Phishing or Ransomware
|| || || || || || || || || || || ||




How does a worm work? - ✔✔Replicates and propagates without a host.
|| || || || || || || || || || ||




Why use a worm? - ✔✔Doesn't need a host and can possibly infect every computer in the
|| || || || || || || || || || || || || || || || ||




world in a short period of time.
|| || || || || ||




How does a Trojan work? - ✔✔Can disguise itself as a useful program and can install
|| || || || || || || || || || || || || || || ||




backdoors or rootkits. || ||




Why use a Trojan? - ✔✔Has the ability to disguise itself and can install backdoors.
|| || || || || || || || || || || || || ||




What is a good protection against Trojans? - ✔✔A good software or hardware firewall.
|| || || || || || || || || || || || ||




What is a Macro virus? - ✔✔A virus that's encoded as a macro in programs that support a
|| || || || || || || || || || || || || || || || || ||




programming language. ||




Why use a Macro virus? - ✔✔Easily created by non-programmers
|| || || || || || || || ||

Geschreven voor

Instelling
Ethical Hacking
Vak
Ethical Hacking

Documentinformatie

Geüpload op
26 januari 2026
Aantal pagina's
16
Geschreven in
2025/2026
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

€17,74
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
Ruiz Liberty University
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
96
Lid sinds
1 jaar
Aantal volgers
1
Documenten
13905
Laatst verkocht
3 weken geleden
Top-Quality Study Materials for Success – Ace Your Exams with Expert Resources!

Access high-quality study materials to help you excel in your exams. Get notes, summaries, and guides tailored to your courses!

3,2

15 beoordelingen

5
4
4
4
3
2
2
1
1
4

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen