Skip to main content
All Quizzes

Ethical Hacking Quiz — Modules 1–3

Q&A covering ethical hacking fundamentals, the penetration testing lifecycle, CIA triad, cyber kill chain, tools (Nmap, Wireshark, Metasploit), legal frameworks (GDPR, HIPAA, PCI DSS), and black/white/grey box testing.

Q 29 questions·CSIS 580 Ethical Hacking — Modules 1–3
A vulnerability
Intelligence
Information gathering and vulnerability scanning
Delivery
Blue
Wireshark
Spooftooph
Information gathering and vulnerability scanning
Confidentiality
CeWL
Red
Darren should have reported the permission issue.
An isolated environment that allows you to experiment
To simulate a hardware device with an installed operating system
ifconfig
Specialized servers to manage an enterprise network and handle identity security requests. They have unique attack vectors and vulnerabilities because of the various services they offer.
End of life means the developer is no longer going to support the operating system.
Media Creation Tool
Scope Document
Best practices
Best Practice
Delete cardholder data immediately.
Modify what data is collected and shared
Health Insurance Portability and Accountability Act (HIPAA)
Third-party service providers
MITRE ATT&CK Framework
OSSTMM
Nothing about the target
Phishing

These answers are free — always.

If this study guide helped you prepare for your exam, consider extending a hand to Mary & Lydia through AbleHearts — a community supporting those in need. Even a small contribution makes a real difference.

Donate to AbleHearts

able-hearts.org/donate · Helping Mary & Lydia