Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

Ethical Hacking Final Exam Study Guide questions with verified detailed answers

Rating
-
Sold
-
Pages
18
Grade
A+
Uploaded on
26-01-2026
Written in
2025/2026

Ethical Hacking Final Exam Study Guide questions with verified detailed answers

Institution
Ethical Hacking
Course
Ethical Hacking

Content preview

2



Ethical Hacking Final Exam Study Guide questions with
|| || || || || || || ||




verified detailed answers || ||




Which of the following is a non-profit organization that is in favor of hacking in the
|| || || || || || || || || || || || || || || ||




traditional sense and advocates for the expression of electronic freedom?
|| || || || || || || || ||




a) Freetonic
||




b) Free Internet
|| ||




c) Electronic Frontier Foundation
|| || ||




d) Anonymous - ✔✔Electronic Frontier Foundation
|| || || || ||




is considered a hacktivist group.
|| || || ||




a) Skids
||




b) Free Internet
|| ||




c) Hack Justice
|| ||




d) WikiLeaks - ✔✔WikiLeaks
|| || ||




For the U.S. Department of Justice, which of the following is not treated the same with
|| || || || || || || || || || || || || || || ||




regard to the law for combatting cybercrimes because their activities may not break the law?
|| || || || || || || || || || || || || ||




a) Hackers
|| ||




b) Crackers
||




c) Packet monkeys
|| ||




d) None of the above - ✔✔None of the above
|| || || || || || || || ||




Which of the following is not considered a type of social engineering activity that an ethical
|| || || || || || || || || || || || || || || ||




hacking can conduct? || ||




a) Sending phishing email to a company's employees.
|| || || || || || ||

,2


b) Making phone calls targeting a company's employees in attempt to test the likelihood
|| || || || || || || || || || || || || ||




that some of them may give away login credentials
|| || || || || || || ||




c) Using the kindness card when talking to a company's employees in an attempt make
|| || || || || || || || || || || || || || ||




them comfortable and reveal secrets that may jeopardize the company's network security
|| || || || || || || || || || ||




d) Contacting companies' employees through social media to establish trust with the goal of
|| || || || || || || || || || || || ||




getting them to reveal sensitive information
|| || || || || ||




e) None of the above - ✔✔None of the above
|| || || || || || || || ||




Analyzing computer programs manually trying to discover bad programming that is done
|| || || || || || || || || || || ||




without security in mind is part of what ethical hackers do.
|| || || || || || || || || ||




a) True
||




b) False - ✔✔True
|| || ||




This is called code review.
|| || || ||




Which of the following should be used to scan a Windows-based computer in order to
|| || || || || || || || || || || || || || ||




generate a report showing the applications installed and the potential exposures?
|| || || || || || || || || ||




a) Netsparker
||




b) AirCrack
||




c) MBSA
||




d) All of the above - ✔✔MBSA
|| || || || || ||




Netsparker is a scanner for scanning Web applications for vulnerabilities. AirCrack is packet
|| || || || || || || || || || || ||




sniffer a key cracking tool for wireless networks.
|| || || || || || || ||




Which of the following is typically automated using computer-based tools? (Choose the best
|| || || || || || || || || || || ||




answer?
||




a) A Security test
|| || ||




b) A penetration test
|| || ||




c) A vulnerability assessment
|| || ||

, 2


d) Shoulder surfing - ✔✔A vulnerability assessment
|| || || || || ||




Vulnerability assessment is an activity that security testers conduct in order to know about
|| || || || || || || || || || || || || ||




potential systems' vulnerabilities before engaging in their testing. Penetration testing
|| || || || || || || || || ||




involves probing or attacking a system in order to exploit potential vulnerabilities. One of
|| || || || || || || || || || || || || ||




the differences between penetration testing and security testing is that security testing
|| || || || || || || || || || || ||




involves analyzing a company's security policies in order to find potential weaknesses that
|| || || || || || || || || || || || ||




may jeopardize security.
|| ||




Which of the following may not be included in a penetration test report?
|| || || || || || || || || || || ||




a) How risks of exploiting exposures are rated
|| || || || || || ||




b) Recommendations about dealing with potential exposures
|| || || || || ||




c) Technical details about vulnerabilities, and possible mitigation options
|| || || || || || || ||




d) Details about attacks conducted
|| || || ||




e) None of the above - ✔✔None of the above
|| || || || || || || || ||




A ________________________ can help determine that a company's specific security
|| || || || || || || || || ||




procedures are not implemented. || || ||




a) Penetration testing
|| ||




b) Security testing
|| || ||




c) Vulnerability assessment
|| ||




d) Only a and b - ✔✔Security testing
|| || || || || || ||




An ethical hacker can launch a denial of service attack against a company's server.
|| || || || || || || || || || || || ||




a) True
||




b) False - ✔✔True
|| || ||

Written for

Institution
Ethical Hacking
Course
Ethical Hacking

Document information

Uploaded on
January 26, 2026
Number of pages
18
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$18.49
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Ruiz Liberty University
View profile
Follow You need to be logged in order to follow users or courses
Sold
94
Member since
1 year
Number of followers
1
Documents
13801
Last sold
3 days ago
Top-Quality Study Materials for Success – Ace Your Exams with Expert Resources!

Access high-quality study materials to help you excel in your exams. Get notes, summaries, and guides tailored to your courses!

3.2

15 reviews

5
4
4
4
3
2
2
1
1
4

Trending documents

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions