Escrito por estudiantes que aprobaron Inmediatamente disponible después del pago Leer en línea o como PDF ¿Documento equivocado? Cámbialo gratis 4,6 TrustPilot
logo-home
Examen

Ethical Hacking Essentials Exam Prep QUESTIONS WITH ANSWERS

Puntuación
-
Vendido
-
Páginas
150
Grado
A+
Subido en
05-12-2025
Escrito en
2025/2026

Ethical Hacking Essentials Exam Prep QUESTIONS WITH ANSWERS

Institución
Ethical Hacking Essentials
Grado
Ethical Hacking Essentials

Vista previa del contenido

Ethical Hacking Essentials Exam Prep |\ |\ |\ |\




QUESTIONS WITH ANSWERS
|\ |\ |\




The assurance that the systems responsible for delivering, storing, and processing
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\


information are accessible when required by authorized users is referred to by
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\


which of the following elements of information security?
|\ |\ |\ |\ |\ |\ |\ |\




A. non-repudiation
|\




B. integrity
|\




C. confidentiality
|\




D. availability - CORRECT ANSWERS ✔✔D. availability
|\ |\ |\ |\ |\ |\




Identify the element of information security that refers to the quality of being
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\


genuine or uncorrupted as a characteristic of any communication, documents, or
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\


any data.
|\ |\




A. integrity
|\




B. authenticity
|\




C. availability
|\




D. confidentiality - CORRECT ANSWERS ✔✔B. authenticity
|\ |\ |\ |\ |\ |\




Mark, a professional hacker, targets his opponent's website. He finds susceptible
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\


user inputs, injects malicious SQL code into the database, and tampers with
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\


critical information.
|\ |\

,Which of the following types of attack did Mark perform in the above scenario?
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\




A. close-in attack
|\ |\




B. passive attack
|\ |\




C. insider attack
|\ |\




D. active attack - CORRECT ANSWERS ✔✔D. active attack
|\ |\ |\ |\ |\ |\ |\ |\




Ruby, a hacker, visited her target company disguised as an aspiring candidate
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\


seeking a job. She noticed that certain sensitive documents were thrown in the
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\


trash near an employee's desk. She collected these documents, which included
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\


critical information that helped her to perform further attacks.
|\ |\ |\ |\ |\ |\ |\ |\ |\




Identify the type of attack performed by Ruby in the above scenario.
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\




A. close-in attack
|\ |\




B. passive attack
|\ |\




C. insider attack
|\ |\




D. active attack - CORRECT ANSWERS ✔✔A. close-in attack
|\ |\ |\ |\ |\ |\ |\ |\




James, a malware programmer, intruded into a manufacturing plant that produces
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\


computer peripheral devices. James tampered with the software inside devices
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\


ready to be delivered to clients. The tampered program creates a backdoor that
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\


allows unauthorized access to the systems.
|\ |\ |\ |\ |\ |\

,Identify the type of attack performed by James in the above scenario to gain
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\


unauthorized access to the delivered systems.
|\ |\ |\ |\ |\ |\




A. directory traversal attack
|\ |\ |\




B. distribution attack
|\ |\




C. phishing attack
|\ |\




D. replay attack - CORRECT ANSWERS ✔✔B. distribution attack
|\ |\ |\ |\ |\ |\ |\ |\




Williams, an employee, was using his personal laptop within the organization's
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\


premises. He connected his laptop to the organization's internal network and
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\


began eavesdropping on the communication between other devices connected
|\ |\ |\ |\ |\ |\ |\ |\ |\


to the internal network. He sniffed critical information such as login credentials
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\


and other confidential data passing through the network.
|\ |\ |\ |\ |\ |\ |\ |\




Identify the type of attack performed by Williams in the above scenario.
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\




A. phishing attack
|\ |\




B. SQL injection attack
|\ |\ |\




C. insider attack
|\ |\




D. replay attack - CORRECT ANSWERS ✔✔C. insider attack
|\ |\ |\ |\ |\ |\ |\ |\




Jack is working as a malware analyst in an organization. He was assigned to
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\


inspect an attack performed against the organization. Jack determined that the
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\


attacker had restricted access to the main computer's files and folders and was
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\


demanding an online payment to remove these restrictions.
|\ |\ |\ |\ |\ |\ |\ |\

, Which of the following type of attack has Jack identified in the above scenario?
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\




A. phishing
|\




B. sniffing
|\




C. ransomware
|\




D. botnet - CORRECT ANSWERS ✔✔C. ransomware
|\ |\ |\ |\ |\ |\




Identify the type of attack vector that focuses on stealing information from the
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\


victim machine without its user being aware and tries to deliver a payload
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\


affecting computer performance.
|\ |\ |\




A. ATP attack
|\ |\




B. botnet
|\




C. insider attack
|\ |\




D. phishing - CORRECT ANSWERS ✔✔A. ATP attack
|\ |\ |\ |\ |\ |\ |\




Andrew, a professional hacker, drafts an email that appears to be legitimate and
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\


attaches malicious links to lure victims; he then distributes it through
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\


communication channels or mails to obtain private information like account
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\


numbers.
|\




Identify the type of attack vector employed by Andrew in the above scenario.
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\

Escuela, estudio y materia

Institución
Ethical Hacking Essentials
Grado
Ethical Hacking Essentials

Información del documento

Subido en
5 de diciembre de 2025
Número de páginas
150
Escrito en
2025/2026
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

$29.49
Accede al documento completo:

¿Documento equivocado? Cámbialo gratis Dentro de los 14 días posteriores a la compra y antes de descargarlo, puedes elegir otro documento. Puedes gastar el importe de nuevo.
Escrito por estudiantes que aprobaron
Inmediatamente disponible después del pago
Leer en línea o como PDF

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
EXAMSTUDYPLUG Stanford University
Ver perfil
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
337
Miembro desde
3 año
Número de seguidores
107
Documentos
19819
Última venta
18 horas hace
GRADE BUDDY

Welcome to My Page! Are you looking for high-quality study resources to ace your exams or better understand your coursework? You've come to the right place! I'm passionate about sharing my knowledge and helping students succeed academically. Here, you'll find a wide range of well-organized notes, study guides, and helpful materials across various subjects, including Maths ,nursig, Biology, History, etc.. Each resource is carefully crafted with detailed explanations, clear examples, and relevant key points to help simplify complex concepts. Whether you're preparing for a test, reviewing lectures, or need extra support, my resources are designed to make your learning experience smoother and more effective. Let me be a part of your academic journey, and feel free to reach out if you have any questions or need personalized assistance!

Lee mas Leer menos
4.5

234 reseñas

5
158
4
50
3
14
2
5
1
7

Documentos populares

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes