Study for the Ethical Hacking Essentials Test. Explore interactive flashcards and multiple-choice questions with hints and explanations. Prepare thoroughly and boost your exam readiness!

Each practice test/flash card set has 50 randomly selected questions from a bank of over 500. You'll get a new set of questions each time!

Practice this question and more.


Which technique would be used to bypass security measures and gain unauthorized access to a system?

  1. Backdoor

  2. Exploit

  3. Social engineering

  4. Encryption

The correct answer is: Exploit

The technique used to bypass security measures and gain unauthorized access to a system is an exploit. An exploit takes advantage of vulnerabilities in software or systems to perform unauthorized actions. It typically targets specific weaknesses in an application, operating system, or hardware to gain control, extract data, or disrupt processes. By executing an exploit, an attacker can bypass defenses that are supposed to prevent unauthorized access, effectively compromising the system. In contrast, while backdoors also allow unauthorized access, they are usually pre-installed access points created either by developers for testing or by attackers after gaining initial access. Social engineering is focused on manipulation of individuals into divulging confidential information rather than directly bypassing technical security measures. Encryption is a method used to protect data and does not facilitate unauthorized access; rather, it serves as a defense mechanism against it.