SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A hacker who aims to bring down critical infrastructure for a 'cause' and does not worry about the penalties associated with his actions.
parallel scan
Trojan Horse
suicide hacker
Collision Domain
2. TCP connect() scan
Level I assessment
-sT
ping sweep
Covert Channel
3. A mode of operation for a block cipher - with the characteristic that each possible block of plaintext has a defined corresponding ciphertext value - and vice versa
Man-in-the-middle attack
Electronic Code Book (ECB)
Exposure Factor
-oN
4. Independent review and examination of records and activities to assess the adequacy of system controls - to ensure compliance with established policies and operational procedures - and to recommend necessary changes.
Domain Name
Lightweight Directory Access Protocol (LDAP)
audit
-b
5. A technology where you advertise one IP address externally and data packets are rerouted to the appropriate IP address inside your network by a device providing translation services. In this way - IP addresses of machines on your internal network are
Network Address Translation (NAT)
Acceptable Use Policy (AUP)
Authorization
reverse lookup; reverse DNS lookup
6. Formerly Redundant Array of Inexpensive Disks; a technology that provides increased storage functions and reliability through redundancy. This is achieved by combining multiple disk drive components into a logical unit - where data is distributed acr
Redundant Array of Independent Disks (RAID)
Wiretapping
ring topology
private key
7. ICMP Ping
self encrypting
Trojan Horse
-PI
Cracker
8. A network deployed as a trap to detect - deflect - or deter unauthorized use of information systems.
GET
honeynet
route
Cryptography
9. A protocol for exchanging packets over a serial line.
Serial Line Internet Protocol (SLIP)
Wi-Fi
Malicious code
Worm
10. 1. The path a packet travels to reach the intended destination. Each individual device along the path traveled is called a hop. 2. Information contained on a device containing instructions for reaching other nodes on the network. This information can
Virus
Redundant Array of Independent Disks (RAID)
personal identification number (PIN)
route
11. A host designed to collect data on suspicious activity.
rootkit
Echo Reply
honeypot
Information Technology Security Evaluation Criteria (ITSEC)
12. Evaluation in which testers attempt to penetrate the network.
Routing Information Protocol (RIP)
Level III assessment
Rijndael
-oG
13. Hex 29
Level I assessment
U P F
Backdoor
honeypot
14. An informed decision to accept the potential for damage to or loss of an IT asset.
DNS
session splicing
risk acceptance
Open System Interconnection (OSI) Reference Model
15. Describes practices in production and development that promote access to the end product's source materials.
Institute of Electrical and Electronics Engineers (IEEE)
R
Computer-Based Attack
open source
16. A utility that sends an ICMP Echo message to determine if a specific IP address is accessible; if the message receives a reply - the address is reachable.
Packet Internet Groper (ping)
Fiber Distributed Data Interface (FDDI)
impersonation
public key infrastructure (PKI)
17. Incremental Substitution
Cryptographic Key
polymorphic virus
Replacing numbers in a url to access other files
Backdoor
18. The central part of a computer or communications system hardware firmware - and software that implements the basic security procedures for controlling access to system resources.
security kernel
Due Care
Event
SYN attack
19. A means of exchanging information from one entity to another using a process that does not provide an attacker the opportunity to reorder - delete - insert - or read information.
Asynchronous
Possession of access devices
suicide hacker
secure channel
20. A hacking method for stealing the cookies used during a session build and replaying them for unauthorized connection purposes.
NetBus
Threat
sidejacking
steganography
21. A secret - typically consisting of only decimal digits - that a claimant memorizes and uses to authenticate his identity
open source
parameter tampering
Distributed DoS (DDoS)
personal identification number (PIN)
22. Management policy and procedures designed to maintain or restore business operations - including computer operations - possibly at an alternate location - in the event of emergencies - system failures - or disaster.
Tunneling
Contingency Plan
Internal access to the network
Vulnerability Management
23. Layer 6 of the OSI reference model. The Presentation layer ensures information sent by the Application layer of the sending system will be readable by the Application layer of the receiving system.
Secure Sockets Layer (SSL)
Blowfish
open source
Presentation layer
24. A malicious computer program with self-replication capabilities that attaches to another file and moves with the host from one computer to another.
Virus
risk assessment
shrink-wrap code attacks
Routing Protocol
25. A series of documents and notes on standards used or proposed for use on the Internet; each is identified by a number.
Request for Comments (RFC)
smart card
-oX
Secure Multipurpose Mail Extension (S/MIME)
26. Software that has advertisements embedded within. Generally displays ads in the form of pop-ups.
A series of messages sent by someone attempting to break into a computer to learn about the computer's network services.
Adware
private key
router
27. Wireless LAN standards created by IEEE. 802.11a runs at up to 54Mbps at 5GHz - 802.11b runs at 11Mbps at 2.4GHz - 802.11g runs at 54Mbps at 2.4GHz - and 802.11n can run upwards of 150MBps.
802.11
Pretty Good Privacy (PGP)
Cold Site
route
28. Port Scanning
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
29. A penetration test in which the ethical hacker has limited knowledge of the intended target(s). Designed to simulate an internal - but non-systemadministrator-level attack.
Copyright
risk acceptance
A series of messages sent by someone attempting to break into a computer to learn about the computer's network services.
gray box testing
30. A fully operational off-site data-processing facility equipped with hardware and system software to be used in the event of a disaster.
DNS enumeration
hot site
suicide hacker
security bulletins
31. A document describing information security guidelines - policies - procedures - and standards.
TACACS
Information Technology (IT) security architecture and framework
parameter tampering
GET
32. An Application layer protocol for sending electronic mail between servers.
identity theft
Presentation layer
payload
Simple Mail Transfer Protocol (SMTP)
33. A widely used authentication protocol developed at the MassachusettsInstitute of Technology (MIT). Kerberos authentication uses tickets - Ticket Granting Service - and Key Distribution Center.
protocol
private network address
proxy server
Kerberos
34. A symmetric - block-cipher data-encryption standard that uses a variablelength key that can range from 32 bits to 448 bits.
Finding a directory listing and gaining access to a parent or root file for access to other files
session splicing
Blowfish
Tunneling
35. A virus written in a macro language and usually embedded in document or spreadsheet files.
Macro virus
security incident response team (SIRT)
Methodology
net use \[target ip]IPC$ '' /user:''
36. White box test
Videocipher II Satellite Encryption System
Internal access to the network
Malicious code
Acknowledgment (ACK)
37. Originally an extension of PPP - this is a protocol for authentication used within wireless networks. Works with multiple authentication measures.
Three-Way (TCP) Handshake
security defect
packet filtering
Extensible Authentication Protocol (EAP)
38. A symmetric key cipher where plaintext bits are combined with a pseudo-random cipher bit stream (keystream) - typically by an exclusive-or (XOR) operation. In a stream cipher the plaintext digits are encrypted one at a time - and the transformation o
Asynchronous
stream cipher
Internet Assigned Number Authority (IANA)
overt channel
39. Malicious code that uses a polymorphic engine to mutate while keeping the original algorithm intact; the code changes itself each time it runs - but the function of the code will not change.
Authentication - Authorization - and Accounting (AAA)
polymorphic virus
POST
Bluejacking
40. The conveying of official access or legal power to a person or entity.
Authentication
Cryptographic Key
Level I assessment
Authorization
41. The cyclical practice of identifying - classifying - remediating - and mitigating vulnerabilities.
Ethical Hacker
physical security
forwarding
Vulnerability Management
42. An extensible mechanism for e-mail. A variety of MIME types exist for sending content such as audio - binary - or video using the Simple Mail Transfer Protocol (SMTP).
serialize scans & 0.4 sec wait
Multipurpose Internet Mail Extensions (MIME)
Master boot record infector
-sP
43. The process of attaching a particular protocol header and trailer to a unit of data before transmission on the network. Occurs at layer 2 of the OSI reference model.
encapsulation
iris scanner
risk transference
impersonation
44. A three-step process computers execute to negotiate a connection with one another. The three steps are SYN - SYN/ACK - ACK.
Ethical Hacker
FreeBSD
-sS
Three-Way (TCP) Handshake
45. A structured set of criteria for evaluating computer security within products and systems produced by European countries; it has been largely replaced by the Common Criteria.
Echo Reply
Cryptography
Information Technology Security Evaluation Criteria (ITSEC)
Annualized Loss Expectancy (ALE)
46. A wireless LAN security standard developed by IEEE. Requires Temporal Key Integrity Protocol (TKIP) and Advanced Encryption Standard (AES).
802.11 i
Finger
Audit Trail
packet filtering
47. A term trademarked by the Wi-Fi Alliance - used to define a standard for devices to use to connect to a wireless network.
Wi-Fi
Antivirus (AV) software
sidejacking
Cracker
48. A device providing temporary - on-demand - point-to-point network access to users.
-sX
network access server
NOP
heuristic scanning
49. Attacks that take advantage of the built-in code and scripts most off-the-shelf applications come with.
Due Care
shrink-wrap code attacks
Information Technology Security Evaluation Criteria (ITSEC)
Certificate Authority (CA)
50. A cyber attacker who acts without permission from - and gives prior notice to - the resource owner. Also known as a malicious hacker.
NetBus
Cracker
Domain Name
Collision Domain