New SAT Writing and Language Practice Test 16

Home > SAT Test > SAT Writing and Language Practice Tests

Test Information

Question 11 questions

Time 9 minutes

See All test questions

Take more free SAT Writing and Language Practice Tests available from

An Official, Certified…Criminal?


The image is as old as computers themselves. [2] These are the hackers, immortalized in the 1995 cult classic film Hackers. [3] Of late, these "cybercriminals" have become the scourge of the American public 1 in recent years because of huge security breaches at major businesses. [4] "Hackers" are the reason we password-protect our WiFi networks and feel a twinge of skepticism every time we pay for something with a credit card. [5] A ponytailed group of geeks, their computer monitors reflecting brightly off of their glasses, breaks into some "mainframe" from an evil corporation.2


  • B. in the present day
  • C. presently
  • D. DELETE the underlined portion.

2. The best placement for sentence 5 would be

  • A. where it is now.
  • B. after sentence 1.
  • C. after sentence 2.
  • D. after sentence 3.

3 While the popular image of the hacker might not have changed, it has, in some cases, been given a bit of a makeover. Schools like Hack Reactor in San Francisco teach aspiring software engineers and wear the name "Hack" proudly, as if it's a sign of 4 authenticity. In this line, a "hacker" is now seen as one whose powers can be used for good as well as ill. There is a new crop of hackers, called Certified Ethical Hackers (CEH), who can help to protect against 5 our evil counterparts and make computers safer for us all.

3. Which of the following would best introduce this paragraph by linking it to ideas from the previous paragraph?

  • B. Because hacking is a federal crime with a range of punishments,
  • C. As identity theft becomes a more public problem,
  • D. Although hackers' style is now more conventionally attractive,

4. Which of the following alternatives to the underlined portion would be LEAST acceptable?

  • A. Realness
  • B. Legitimacy
  • C. Legality
  • D. Genuineness


  • B. one's
  • C. the
  • D. their

Certified Ethical Hackers follow a course of study either at an Accredited Training Center or by self-study. The final exam is a 125 multiple-choice exam: it takes four hours and requires 70% correct to receive a passing score. There is another 6 certification Certified Network Defense Architect which has the same basic course and test but is available only for certain U.S. Government agents.7


  • B. certification, Certified Network Defense Architect,
  • C. certification Certified Network Defense Architect,
  • D. certification, Certified Network Defense Architect

7. The writer is considering deleting the phrase but is available only for certain U.S. Government agents from the preceding sentence, ending the sentence with a period after the word test. Should this phrase be kept or deleted?

  • A. Kept, because it helps to differentiate the two certifications mentioned in this paragraph.
  • B. Kept, because it shows that CEHs also have an important role to play in maintaining national security.
  • C. Deleted, because it contains information already stated in an earlier part of the paragraph.
  • D. Deleted, because it suggests that hacking is only a problem in the United States.

CEHs combine many facets of computer study into 8 one typically. A company will hire a CEH to ensure maximum security of that company's network, whether that's company secrets or customer payment information or anything in between. Essentially, an ethical hacker does everything that an unethical one does, but he or she does so at the request of a particular organization. "We want you to hack us," says that organization, "so we 9 will have known how to avoid being hacked." It's kind of like the old saying, "It takes a crook to catch a thief," except in this case the "crook" is not a crook at all.10

Some in the computing community disparage the term. They say that "hacker" is a criminal designation, so saying "ethical hacker" is like saying "ethical thief," that is, a 11 contradiction of terms. This objection is of course overstated, and overwhelmingly, companies are happy to have "hackers" on staff. That designation can help to overcome the stodgy, impersonal image that corporations tend to have, and it can tap in to a kind of underground energy that many find irresistible.


  • B. one, typically, a company
  • C. one. Typically, a company
  • D. one typically; a company


  • B. knew
  • C. know
  • D. would of known

10. At this point, the writer is considering adding the following true sentence:

To Catch a Thief was directed by Alfred Hitchcock and released in 1955.

Should the writer make this addition here?

  • A. Yes, because it helps to clarify the origin of the saying cited in the previous sentence.
  • B. Yes, because it is as relevant to the passage as the movie Hackers cited in the first paragraph.
  • C. No, because it does not maintain this paragraph's focus on ethical hacking.
  • D. No, because it mentions a movie that existed before computer hacking became widespread.


  • B. contradictory under terms.
  • C. contradiction by terms.
  • D. contradiction in terms.