Prepare for the Ethical Hacking Essentials Test. Study with flashcards and multiple-choice questions, each exam includes hints and explanations. Get ready to ace your certification exam!

Each practice test/flash card set has 50 randomly selected questions from a bank of over 500. You'll get a new set of questions each time!

Practice this question and more.


Which technique would be used to bypass security measures and gain unauthorized access to a system?

  1. Backdoor

  2. Exploit

  3. Social engineering

  4. Encryption

The correct answer is: Exploit

The technique used to bypass security measures and gain unauthorized access to a system is an exploit. An exploit takes advantage of vulnerabilities in software or systems to perform unauthorized actions. It typically targets specific weaknesses in an application, operating system, or hardware to gain control, extract data, or disrupt processes. By executing an exploit, an attacker can bypass defenses that are supposed to prevent unauthorized access, effectively compromising the system. In contrast, while backdoors also allow unauthorized access, they are usually pre-installed access points created either by developers for testing or by attackers after gaining initial access. Social engineering is focused on manipulation of individuals into divulging confidential information rather than directly bypassing technical security measures. Encryption is a method used to protect data and does not facilitate unauthorized access; rather, it serves as a defense mechanism against it.