Skip to main content
All Quizzes

Ethical Hacking Final Exam — Modules 7–14

Final exam Q&A for modules 7–14: wireless attacks (802.11, WPS, deauth), web app attacks (XSS, CSRF, SQLi), host exploitation (Metasploit, privilege escalation), social engineering, reporting, and scripting (Bash, PowerShell).

Q 40 questions·CSIS 580 Ethical Hacking — Modules 7–14 Final
802.11 is the wireless technology standard, and 802.1x is a standard that defines the process of authenticating and authorizing users on a network.
deauthentication attack
wash
• Bluesnarfer • Btscanner • Redfang • Spooftooth
jamming
445
LPD
On-path attack
Scapy
THC Hydra
OWASP
• injection vulnerabilities • authentication flaws and weaknesses
• cross-site scripting • XSS
code injection
cross-site request forgery
side-channel attack
• file system permission configuration errors • defaults
remote access
SUDO exploits
Metasploit Framework
• social engineering • physical attack
• theft • destruction • financial
find and mitigate social engineering weaknesses
pretext for an approach
phishing
• discovered weaknesses/vulnerabilities • methods used • security implications
executive summary
administrative controls
• security discoveries requiring immediate attention • scope or ROE changes • determining false positives
indicators of compromise
branch, loop, and test
• interpreted • scripts
Bash scripts
Set-ExecutionPolicy
object-oriented
CeWL
a Bash script
performs a ping sweep scan to discover devices on the 192.168.0.1/24 network
ROE
Pen-test reports contain sensitive information and should be securely handled and stored.

These answers are free — always.

If this study guide helped you prepare for your exam, consider extending a hand to Mary & Lydia through AbleHearts — a community supporting those in need. Even a small contribution makes a real difference.

Donate to AbleHearts

able-hearts.org/donate · Helping Mary & Lydia