Test your basic knowledge |

CEH: Certified Ethical Hacker

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Port Scanning

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


2. A widely used authentication protocol developed at the MassachusettsInstitute of Technology (MIT). Kerberos authentication uses tickets - Ticket Granting Service - and Key Distribution Center.






3. ACK Scan






4. An organized collection of data.






5. A biometric device that uses pattern-recognition techniques based on images of the irises of an individual's eyes.






6. A form of fraud in which someone pretends to be someone else by assuming that person's identity - typically in order to access resources or obtain credit and other benefits in that person's name.






7. The act or actions of a hacker to put forward a cause or a political agenda - to affect some societal change - or to shed light on something he feels to be political injustice. These activities are usually illegal in nature.






8. Sending unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobile phones - PDAs - or laptop computers.






9. A set of exclusive rights granted by the law of a jurisdiction to the author or creator of an original work - including the right to copy - distribute - and adapt the work.






10. List Scan






11. A self-replicating malicious program that attempts installation beneath antivirus software by directly intercepting the interrupt handlers of the operating system to evade detection.






12. The Security Accounts Manager file in Windows stores all the password hashes for the system.






13. A sublayer of layer 2 of the OSI model - the Data Link layer. It provides addressing and channel access control mechanisms that enable several terminals or network nodes to communicate within a multipoint network.






14. A social-engineering attack that manipulates the victim into calling the attacker for help.






15. An adapter that provides the physical connection to send and receive data between the computer and the network media.






16. In penetration testing - enumeration is the act of querying a device or network segment thoroughly and systematically for information.






17. Polite scan timing






18. An Application layer protocol - using TCP - for transporting files across an Internet connection. FTP transmits in clear text.






19. A domain composed of all the systems sharing any given physical transport media. Systems within a collision domain may collide with each other during the transmission of data. Collisions can be managed by CSMA/CD (collision detection) or CSMA/CA (col






20. Calculations of two components of risk: R - the magnitude of the potential loss (L) - and the probability - p - that the loss will occur.






21. A type of encryption where the same key is used to encrypt and decrypt the message.






22. Policy stating what users of a system can and cannot do with the organization's assets.






23. A communications path - such as the Internet - authorized for data transmission within a computer system or network.






24. Port 110






25. The monetary value expected from the occurrence of a risk on an asset. It is mathematically expressed as single loss expectancy (SLE) = asset value (AV)






26. The steps taken to gather evidence and information on the targets you wish to attack.






27. A background process found in Unix - Linux - Solaris - and other Unix-based operating systems.






28. A software or hardware application or device that captures user keystrokes.






29. The act of secretly listening to the private conversations of others without their consent. This can also be done over telephone lines (wiretapping) - e-mail - instant messaging - and other methods of communication considered private






30. A measurable - physical characteristic used to recognize the identity - or verify the claimed identity - of an applicant. Facial images - fingerprints - and handwriting samples are all examples of biometrics.






31. An attack where the hacker manipulates parameters within the URL string in hopes of modifying data.






32. Also known as the dot-dot-slash attack. Using directory traversal - the attacker attempts to access restricted directories and execute commands outside intended web server directories by using the URL to redirect to an unintended folder location.






33. A standard for encrypting and authenticating MIME data; used primarily for Internet e-mail.






34. Black box test






35. A list of IP addresses and corresponding MAC addresses stored on a local computer.






36. Literally - 'not balanced or the same.' In computing - asymmetric refers to a difference in networking speeds upstream to downstream. In cryptography - it's the use of more than one key for encryption/authentication purposes.






37. A query and response protocol widely used for querying databases that store the registered users or assignees of an Internet resource - such as a domain name - an IP address - or an autonomous system.






38. A limited-function version of the Internetworking Operating System (IOS) - held in read-only memory in some earlier models of Cisco devices - capable of performing several seldom-needed low-level functions such as loading a new IOS into Flash memory






39. Used for exchanging structured information - such as XML-based messages - in the implementation of web services






40. A suite of protocols used for securing Internet Protocol (IP) communications by authenticating and encrypting each IP packet of a communication session. This suite includes protocols for establishing mutual authentication between agents at the sessio






41. A legal limit on the amount of financial liability and remedies the organization is responsible for taking on.






42. Any kind of connection that allows you to see all traffic passing by. Generally used in reference to a NIDS (network-based IDS) to monitor all traffic.






43. NSA






44. ICMP Type/Code 11






45. Port 31337






46. A storage buffer that transparently stores data so future requests for the same data can be served faster.






47. A situation in which an IDS or other sensor triggers on an event as an intrusion attempt - when it was actually legitimate traffic.






48. Safeguards or countermeasures to avoid - counteract - or minimize security risks.






49. Malware designed to install some sort of virus - backdoor - and so on - on a target system.






50. Transmitting one protocol encapsulated inside another protocol.