100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

CMIT 321| ETHICAL HACKING| FINAL EXAM WITH 100% CORRECT ANSWERS| 2024|GRADED A

Rating
-
Sold
-
Pages
29
Grade
A+
Uploaded on
01-10-2025
Written in
2025/2026

CMIT 321| ETHICAL HACKING| FINAL EXAM WITH 100% CORRECT ANSWERS| 2024|GRADED A











Whoops! We can’t load your doc right now. Try again or contact support.

Document information

Uploaded on
October 1, 2025
Number of pages
29
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

Foot printing



Ans: 1. ___ is the first step in ethical hacking. it refers to the process of collecting information
about a target network and its environment.



- daisy chaining

- port scanning

- footprinting

- blue printing



(CEHv9 LAB Mod.02)



Quiz hack value



Ans: 2. ___ is the notion among hackers that something is worth doing or is interesting.

,- hack value

- dare

- reconnaissance

- footprinting



(CEHv9 Textbook Mod.01 PG.9)



Quiz daisy chaining



Ans: 3. ____ involves gaining access to one network and/or computer and then using the same
info. to gain access to multiple networks and computers that contain desirable information.



- daisy chaining

- reconnaissance

- port scanning

- footprinting



(CEHv9 Textbook Mod.01 PG.9)



Quiz doxing



Ans: 4. ___ is the act of publishing personally ID'able info. about an individual collected from
publicly available databases and social media.



- daisy chaining

, - reconnaissance

- port scanning

- footprinting



(CEHv9 Textbook Mod.01 PG.9)



Quiz OS attack



Ans: 5. a(n) __ is a type of system attack where attackers search for vulnerabilities in an OS's
design, install, or config. and exploit them to *gain access to a system*.



- OS attack

- misconfiguration attack

- application-level attack

- shrink-wrap code attack



(CEHv9 Textbook Mod.01 PG.13)



Quiz misconfiguration attack



Ans: 6. a(n) __ is a type of system attack where attacks are made on misconfiguration
vulnerabilities that affect web servers, app. plateforms, databases, networks, or frameworks
that may result in illegal access or possible owning of the system.



- OS attack
$19.60
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
Medicpass

Get to know the seller

Seller avatar
Medicpass Teachme2-tutor
View profile
Follow You need to be logged in order to follow users or courses
Sold
0
Member since
3 months
Number of followers
0
Documents
300
Last sold
-
Medipass

MediPass – Your Shortcut to Nursing Exam Success Welcome to MediPass, the ultimate hub for nursing exam preparation. Here you’ll find well-organized study notes, exam questions with verified answers, and simplified explanations designed to save you time and boost your confidence. My resources are created to help nursing students study smarter, not harder — making complex concepts easy to understand and exams easier to pass. Whether you’re looking for past papers, Q&A packs, or complete study guides, MediPass has you covered.

Read more Read less
0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions