KNOWLEDGE CHECK: ETHICAL HACKING POST-
ASSESSMENT 2025 REVIEW WITH TEST BANK &
CORRECT QUESTIONS & ANSWERS
The starting decimal number of the first byte for a government IP address is most likely to
fall between which range?
1-126
What class contains the IP address 172.16.42.42?
Class B
What is the decimal equivalent of the binary value 1110?
14
What notation do all IPv6 addresses use?
Hexadecimal
Which of the following is an example of malware?
Worm
Ransomware is a growing trend in viruses and illustrates the primary goal of malware. What
is the main goal of malware?
EDUCATIONAL SUPPORT • ACADEMIC RESOURCES • PROFESSIONAL GUIDANCE
,MINDPLUG SOLUTIONS — EMPOWERING MINDS, BUILDING FUTURES
Make money
Which of the following is a common virus?
Carbanak
What strategy may be used to generate business for security testers, but is not only
unethical, it is also against the OSSTMM's Rules of Engagement?
Fear Tactics
To counter the introduction of spyware and adware into a corporate network, you should
invest in an antivirus product. Which of the following programs can be used to remove
spyware or adware?
HitmanPro
What type of attack is occurring when over 10,000 zombie servers are sending several
thousand IP packets to a single network?
DDoS
In a buffer overflow attack, an attacker finds a vulnerability in poorly written code that
doesn't check for a defined amount of memory space use. Which of the following can be
subject to a buffer overflow attack?
Windows Server Service
EDUCATIONAL SUPPORT • ACADEMIC RESOURCES • PROFESSIONAL GUIDANCE
, MINDPLUG SOLUTIONS — EMPOWERING MINDS, BUILDING FUTURES
Which of the following statements about keyloggers is true?
Keyloggers may be software-based
What hardware is designed to detect and remove malware?
Unified Threat Management device
Which of the following terms refers to the process of finding information on a company's
network through prodding in ways that may seem suspicious to network defenders?
Active Reconnaissance
Which of the following could be considered a reconnaissance tool?
Which of the following is a cybersecurity search engine that can be used to search entire
domains or individual systems for vulnerabilities, IPs, DNS records, domains, and more?
Spyse
Which of the following statements about competitive intelligence is true?
It can occur even without technology.
EDUCATIONAL SUPPORT • ACADEMIC RESOURCES • PROFESSIONAL GUIDANCE