SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A partially protected zone on a network - not exposed to the full fury of the Internet - but not fully behind the firewall. This technique is typically used on parts of the network that must remain open to the public (such as a web server) but must a
hot site
sniffer
Asset
Demilitarized Zone (DMZ)
2. A method of password cracking whereby all possible options are systematically enumerated until a match is found. These attacks try every password (or authentication option) - one after another - until successful. Bruteforce attacks take a long time t
Brute-Force Password Attack
Port Address Translation (PAT)
Wi-Fi
Daemon
3. A protocol that allows a client computer to request services from a server and the server to return the results.
Kerberos
Extensible Authentication Protocol (EAP)
remote procedure call (RPC)
signature scanning
4. A text file stored within a browser by a web server that maintains information about the connection. Cookies are used to store information to maintain a unique but consistent surfing experience - but can also contain authentication parameters. Cookie
Real application encompassing Trojan
GET
Cookie
security kernel
5. A widely used authentication protocol developed at the MassachusettsInstitute of Technology (MIT). Kerberos authentication uses tickets - Ticket Granting Service - and Key Distribution Center.
War Chalking
Kerberos
Unicode
MD5
6. Black hat
Boot Sector Virus
Hacks without permission
Contingency Plan
signature scanning
7. A communications protocol used for browsing the Internet.
infrastructure mode
Authentication - Authorization - and Accounting (AAA)
Hypertext Transfer Protocol (HTTP)
operating system attack
8. Hex 10
hardware keystroke logger
A
risk avoidance
Brute-Force Password Attack
9. Authentication confirms the identity of the user or device. Authorization determines the privileges (rights) of the user or device. Accounting records the access attempts - both successful and unsuccessful.
Open System Interconnection (OSI) Reference Model
Replacing numbers in a url to access other files
OpenBSD
Authentication - Authorization - and Accounting (AAA)
10. An encryption standard designed by Joan Daemen and Vincent Rijmen. Chosen by a NIST contest to be the Advanced Encryption Standard (AES).
Due Diligence
heuristic scanning
Bastion host
Rijndael
11. Port 88
queue
symmetric algorithm
forwarding
Kerberos
12. An attack where the hacker repeats a portion of a cryptographic exchange in hopes of fooling the system into setting up a communications channel.
replay attack
Access Point (AP)
Virus
hardware keystroke logger
13. Another term for firewalking
private key
port knocking
Warm Site
Possession of access devices
14. Malware designed to install some sort of virus - backdoor - and so on - on a target system.
Droppers
Hacks with permission
serial scan & 300 sec wait
White Box Testing
15. ICMP Ping
-PI
CAM table
Transport Layer Security (TLS)
Daemon
16. Content Addressable Memory table. Holds all the MAC-address-to-port mappings on a switch.
Interior Gateway Protocol (IGP)
secure channel
Active Fingerprinting
CAM table
17. A fully operational off-site data-processing facility equipped with hardware and system software to be used in the event of a disaster.
Routing Information Protocol (RIP)
Anonymizer
hot site
Ethernet
18. A structured set of criteria for evaluating computer security within products and systems produced by European countries; it has been largely replaced by the Common Criteria.
The automated process of proactively identifying vulnerabilities of computing systems present in a network
Information Technology Security Evaluation Criteria (ITSEC)
Boot Sector Virus
A
19. Shifting responsibility from one party to another
Filter
A S
risk transference
Adware
20. Window Scan
-sW
stream cipher
Sign in Seal
spyware
21. As an identification device becomes more sensitive or accurate - its FAR decreases while its FRR increases. The CER is the point at which these two rates are equal - or cross over.
Internet Control Message Protocol (ICMP)
false rejection rate (FRR)
security breach or security incident
Wired Equivalent Privacy (WEP)
22. Formerly Redundant Array of Inexpensive Disks; a technology that provides increased storage functions and reliability through redundancy. This is achieved by combining multiple disk drive components into a logical unit - where data is distributed acr
Redundant Array of Independent Disks (RAID)
Domain Name System (DNS)
Buffer
Eavesdropping
23. TCP connect() scan
false negative
Ciphertext
-sT
RID Resource identifier
24. A TCP flag notifying an originating station that the preceding packet (or packets) has been received.
risk avoidance
Acknowledgment (ACK)
Console Port
-PP
25. Incremental Substitution
-PP
Virus Hoax
HTTP
Replacing numbers in a url to access other files
26. A set of rules defined to screen network packets based on source address - destination address - or protocol; these rules determine whether the packet will be forwarded or discarded.
social engineering
Auditing
Filter
Worm
27. A non-self-replicating program that appears to have a useful purpose - but in reality has a different - malicious purpose.
serialize scans & 15 sec wait
Sign in Seal
Common Internet File System/Server Message Block
Trojan Horse
28. A collection of historical records or the place where they are kept. In computing - an archive generally refers to backup copies of logs and/or data.
Wide Area Network (WAN)
Echo Reply
Common Internet File System/Server Message Block
Archive
29. An unknown deficiency in software or some other product that results in a security vulnerability being identified.
risk
Cloning
security defect
Fast Ethernet
30. A program designed to browse websites in an automated - methodical manner. Sometimes these programs are used to harvest information from websites - such as e-mail addresses.
Data Link layer
queue
Post Office Protocol 3 (POP3)
Web Spider
31. The rate at which a biometric system will incorrectly identify an unauthorized individual and allow them access (see false negative).
Adware
Domain Name System (DNS) cache poisoning
Mandatory access control (MAC)
False Acceptance Rate (FAR)
32. Aggressive scan timing
parallel scan & 300 sec timeout & 1.25 sec/probe
Computer-Based Attack
Decryption
null session
33. The contents of a packet. A system attack requires the attacker to deliver a malicious payload that is acted upon and executed by the system.
Tunneling
Simple Network Management Protocol (SNMP)
payload
network tap
34. SYN Ping
Network Basic Input/Output System (NetBIOS)
-PS
packet
remote access
35. A connection-oriented - layer 4 protocol for transporting data over network segments. TCP is considered reliable because it guarantees delivery and the proper reordering of transmitted packets. This protocol is used for most long-haul traffic on the
Dumpster Diving
Real application encompassing Trojan
Client
Transmission Control Protocol (TCP)
36. An enumeration technique used to provide information about a computer system; generally used for operating system identification (also known as fingerprinting).
Banner Grabbing
Tumbling
reverse social engineering
Defines legal email marketing
37. Self-contained network with a limited number of participants who extend limited trust to one another in order to accomplish an agreed-upon goal.
R
Address Resolution Protocol (ARP) table
limitation of liability and remedies
intranet
38. The monetary value expected from the occurrence of a risk on an asset. It is mathematically expressed as single loss expectancy (SLE) = asset value (AV)
Event
Transmission Control Protocol (TCP)
FTP
single loss expectancy (SLE)
39. Drawing symbols in public places to alert others to an open Wi-Fi network. War chalking can include the SSIDs - administrative passwords to APs - and other information.
Syslog
integrity
Audit Trail
War Chalking
40. A method of permitting only MAC addresses in a preapproved list network access. Addresses not matching are blocked.
spyware
Google hacking
Competitive Intelligence
MAC filtering
41. A file system used by the Mac OS.
session hijacking
Asynchronous
parallel scan & 300 sec timeout & 1.25 sec/probe
Hierarchical File System (HFS)
42. A class of algorithms for cryptography that use the same cryptographic key for both decryption and encryption.
symmetric algorithm
Daisy Chaining
-PS
routed protocol
43. ICMP Type/Code 8
Echo request
Vulnerability Assessment
passive attack
inference attack
44. FTP Bounce Attack
-b
A R
Active Fingerprinting
End User Licensing Agreement (EULA)
45. Used to find the domain name associated with an IP address; the opposite of a DNS lookup.
Level II assessment
EDGAR database
Post Office Protocol 3 (POP3)
reverse lookup; reverse DNS lookup
46. A standard for encrypting e-mail - web pages - and other stream-oriented information transmitted over the Internet.
Transport Layer Security (TLS)
Internet Assigned Number Authority (IANA)
Secure Multipurpose Mail Extension (S/MIME)
Telnet
47. TCP Ping
Data Link layer
Zero Subnet
Uniform Resource Locator (URL)
-PT
48. Monitoring of telephone or Internet conversations - typically by covert means.
-sT
Internet Control Message Protocol (ICMP)
Wiretapping
Fast Ethernet
49. Port Scanning
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
50. A network deployed as a trap to detect - deflect - or deter unauthorized use of information systems.
asynchronous transmission
Accountability
honeynet
Tumbling