Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

Ethical Hacking Essentials (EHE),Ethical Hacking Essentials Exam Prep QUESTIONS WITH ANSWERS

Rating
-
Sold
-
Pages
199
Grade
A+
Uploaded on
05-12-2025
Written in
2025/2026

Ethical Hacking Essentials (EHE),Ethical Hacking Essentials Exam Prep QUESTIONS WITH ANSWERS

Institution
Ethical Hacking Essentials
Course
Ethical Hacking Essentials

Content preview

Ethical Hacking Essentials (EHE),Ethical
|\ |\ |\ |\




Hacking Essentials Exam Prep |\ |\ |\ |\




QUESTIONS WITH ANSWERS |\ |\




Availability - CORRECT ANSWERS ✔✔Assurance that the systems
|\ |\ |\ |\ |\ |\ |\ |\


responsible for delivering, storing, and processing information are
|\ |\ |\ |\ |\ |\ |\


accessible when required by authorized users.
|\ |\ |\ |\ |\ |\




Authenticity - CORRECT ANSWERS ✔✔Refers to the characteristic
|\ |\ |\ |\ |\ |\ |\ |\


of communication, documents, or any data that ensures the
|\ |\ |\ |\ |\ |\ |\ |\ |\


quality of being genuine or uncorrupted.
|\ |\ |\ |\ |\




Active Attacks - CORRECT ANSWERS ✔✔Tamper with the data in
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\


transit or disrupt the communication or services between the
|\ |\ |\ |\ |\ |\ |\ |\ |\


systems to bypass or break into secured systems.
|\ |\ |\ |\ |\ |\ |\




Advanced Persistent Threats (APT) - CORRECT ANSWERS ✔✔An
|\ |\ |\ |\ |\ |\ |\ |\


attack that is focused on stealing information from the victim
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\


machine without the user being aware of it.
|\ |\ |\ |\ |\ |\ |\




Active Reconnaissance - CORRECT ANSWERS ✔✔Active
|\ |\ |\ |\ |\ |\


reconnaissance techniques involves acquiring information directly |\ |\ |\ |\ |\


interacting with the target by any means.
|\ |\ |\ |\ |\ |\ |\

,Adware - CORRECT ANSWERS ✔✔Adware refers to software or a
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\


program that supports advertisements and generates unsolicited
|\ |\ |\ |\ |\ |\ |\


ads and pop-ups.
|\ |\




Active Assessment - CORRECT ANSWERS ✔✔A type of
|\ |\ |\ |\ |\ |\ |\ |\


vulnerability assessment that uses network scanners to identify |\ |\ |\ |\ |\ |\ |\ |\


the hosts, services, and vulnerabilities present in a network.
|\ |\ |\ |\ |\ |\ |\ |\




Application Assessment - CORRECT ANSWERS ✔✔An application
|\ |\ |\ |\ |\ |\ |\


assessment focuses on transactional web applications, traditional
|\ |\ |\ |\ |\ |\


client-server applications, and hybrid systems.
|\ |\ |\ |\ |\




Automated Assessment - CORRECT ANSWERS ✔✔In this type of|\ |\ |\ |\ |\ |\ |\ |\ |\


assessment, the ethical hacker employs various vulnerability |\ |\ |\ |\ |\ |\ |\


assessment tools, such as Nessus, Qualys, GFI LanGuard, etc. |\ |\ |\ |\ |\ |\ |\ |\




Active Online Attacks - CORRECT ANSWERS ✔✔The attacker
|\ |\ |\ |\ |\ |\ |\ |\


performs password cracking by directly communicating with the
|\ |\ |\ |\ |\ |\ |\ |\


victim's machine. |\




Active Sniffing - CORRECT ANSWERS ✔✔Active sniffing searches
|\ |\ |\ |\ |\ |\ |\ |\


for traffic on a switched LAN by actively injecting traffic into it.
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\




ARP Spoofing Attack - CORRECT ANSWERS ✔✔ARP
|\ |\ |\ |\ |\ |\


spoofing/poisoning involves sending a large number of forged
|\ |\ |\ |\ |\ |\ |\ |\ |\


entries to the target machine's ARP cache.
|\ |\ |\ |\ |\ |\

,Active Session Hijacking - CORRECT ANSWERS ✔✔In an active
|\ |\ |\ |\ |\ |\ |\ |\ |\


attack, an attacker takes over an existing session either by
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\


breaking the connection on one side of the conversation or by
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\


actively participating. |\




Application Level Hijacking - CORRECT ANSWERS ✔✔Application
|\ |\ |\ |\ |\ |\ |\


level hijacking involves gaining control over the Hypertext
|\ |\ |\ |\ |\ |\ |\ |\


Transfer Protocol (HTTP) user session by obtaining the session
|\ |\ |\ |\ |\ |\ |\ |\ |\


IDs.


Access Point (AP) - CORRECT ANSWERS ✔✔An AP is used to
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\


connect wireless devices to a wireless/wired network.
|\ |\ |\ |\ |\ |\




Association - CORRECT ANSWERS ✔✔It refers to the process of
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\


connecting a wireless device to an AP. |\ |\ |\ |\ |\ |\




AES - CORRECT ANSWERS ✔✔It is a symmetric-key encryption
|\ |\ |\ |\ |\ |\ |\ |\ |\


used in WPA2 as a replacement for TKIP.
|\ |\ |\ |\ |\ |\ |\




App Sandboxing - CORRECT ANSWERS ✔✔App sandboxing is a
|\ |\ |\ |\ |\ |\ |\ |\ |\


security mechanism that helps protect systems and users by
|\ |\ |\ |\ |\ |\ |\ |\ |\


limiting the resources that an app can access to its intended
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\


functionality on the mobile platform. |\ |\ |\ |\




Agent Smith Attack - CORRECT ANSWERS ✔✔An Agent smith
|\ |\ |\ |\ |\ |\ |\ |\ |\


attack is carried out by persuading the victim to install a
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\


malicious app designed and published by an attacker.
|\ |\ |\ |\ |\ |\ |\

, Brute-Force Attack - CORRECT ANSWERS ✔✔In a brute-force |\ |\ |\ |\ |\ |\ |\ |\


attack, attackers try every combination of characters until the
|\ |\ |\ |\ |\ |\ |\ |\ |\


password is broken. |\ |\




Botnet - CORRECT ANSWERS ✔✔A botnet is a huge network of
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\


compromised systems used by attackers to perform a distributed |\ |\ |\ |\ |\ |\ |\ |\


task.
|\




Black Hats - CORRECT ANSWERS ✔✔Black hats are individuals
|\ |\ |\ |\ |\ |\ |\ |\ |\


who use their extraordinary computing skills for illegal or
|\ |\ |\ |\ |\ |\ |\ |\ |\


malicious purposes. |\




Broken Access Control - CORRECT ANSWERS ✔✔Broken access
|\ |\ |\ |\ |\ |\ |\ |\


control is a method in which an attacker identifies a flaw related
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\


to access control and bypasses the authentication, which allows
|\ |\ |\ |\ |\ |\ |\ |\ |\


them to compromise the network.
|\ |\ |\ |\




Bandwidth - CORRECT ANSWERS ✔✔It describes the amount of
|\ |\ |\ |\ |\ |\ |\ |\ |\


information that may be broadcast over a connection. |\ |\ |\ |\ |\ |\ |\




Basic Service Set Identifier (BSSID) - CORRECT ANSWERS ✔✔It is
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\


the media access control (MAC) address of an access point (AP)
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\


or base station that has set up a basic service set (BSS).
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\




Bluetooth - CORRECT ANSWERS ✔✔Bluetooth is a short-range
|\ |\ |\ |\ |\ |\ |\ |\


wireless communication technology that replaces cables
|\ |\ |\ |\ |\ |\


connecting portable or fixed devices while maintaining high
|\ |\ |\ |\ |\ |\ |\ |\


levels of security. |\ |\

Written for

Institution
Ethical Hacking Essentials
Course
Ethical Hacking Essentials

Document information

Uploaded on
December 5, 2025
Number of pages
199
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$31.99
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
EXAMSTUDYPLUG Stanford University
View profile
Follow You need to be logged in order to follow users or courses
Sold
337
Member since
3 year
Number of followers
107
Documents
19819
Last sold
15 hours ago
GRADE BUDDY

Welcome to My Page! Are you looking for high-quality study resources to ace your exams or better understand your coursework? You've come to the right place! I'm passionate about sharing my knowledge and helping students succeed academically. Here, you'll find a wide range of well-organized notes, study guides, and helpful materials across various subjects, including Maths ,nursig, Biology, History, etc.. Each resource is carefully crafted with detailed explanations, clear examples, and relevant key points to help simplify complex concepts. Whether you're preparing for a test, reviewing lectures, or need extra support, my resources are designed to make your learning experience smoother and more effective. Let me be a part of your academic journey, and feel free to reach out if you have any questions or need personalized assistance!

Read more Read less
4.5

234 reviews

5
158
4
50
3
14
2
5
1
7

Trending documents

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions