SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A well-known and studied phenomenon of human nature - whereby a single trait influences the perception of other traits.
802.11
Buffer Overflow
halo effect
Data Link layer
2. In penetration testing - enumeration is the act of querying a device or network segment thoroughly and systematically for information.
Simple Mail Transfer Protocol (SMTP)
Cryptography
enumeration
Tumbling
3. A symmetric key cryptographic algorithm that transforms a block of information at a time using a cryptographic key. For a block cipher algorithm - the length of the input block is the same as the length of the output block.
Block Cipher
route
Temporal Key Integrity Protocol (TKIP)
Time Bomb
4. The art and science of creating a covert message or image within another message - image - audio - or video file.
Internet Protocol (IP)
steganography
Defines legal email marketing
Active Fingerprinting
5. Manipulating a search string with additional specific operators to search for vulnerabilities or very specific information.
hashing algorithm
Google hacking
Information Technology Security Evaluation Criteria (ITSEC)
Threat
6. A method of falsely identifying the source of data packets; often used by hackers to make it difficult to trace where an attack originated.
infrastructure mode
spoofing
Auditing
Virus Hoax
7. A function that is easy to compute in one direction - yet believed to be difficult to compute in the opposite direction (finding its inverse) without special information - called the 'trapdoor.' Widely used in cryptography.
-oG
Trapdoor Function
Uniform Resource Locator (URL)
route
8. A step-by-step method of solving a problem. In computing security - an algorithm is a set of mathematical rules (logic) for the process of encryption and decryption
Algorithm
Copyright
SYN flood attack
International Organization for Standardization (ISO)
9. A storage buffer that transparently stores data so future requests for the same data can be served faster.
Service Set Identifier (SSID)
Black Hat
script kiddie
Cache
10. Port Scanning
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
11. A query and response protocol widely used for querying databases that store the registered users or assignees of an Internet resource - such as a domain name - an IP address - or an autonomous system.
Confidentiality
Kerberos
Whois
spam
12. A network administration command-line tool available for many operating systems for querying the Domain Name System (DNS) to obtain domain name or IP address mappings or any other specific DNS record.
Computer-Based Attack
honeypot
Client
nslookup
13. A utility that traces a packet from your computer to an Internet host - showing how many hops the packet takes to reach the host and how long the packet requires to complete the hop.
Target Of Engagement (TOE)
scope creep
Third Party
Traceroute
14. Establish Null Session
intrusion prevention system (IPS)
net use \[target ip]IPC$ '' /user:''
Brute-Force Password Attack
symmetric encryption
15. The act of checking some sequence of tokens for the presence of the constituents of some pattern.
HIDS
penetration testing
halo effect
pattern matching
16. Injecting traffic into the network to identify the operating system of a device.
Collision Domain
Active Fingerprinting
Zombie
private key
17. Normal scan timing
parallel scan
Time Bomb
Extensible Authentication Protocol (EAP)
Internal access to the network
18. A symmetric - block-cipher data-encryption standard that uses a variablelength key that can range from 32 bits to 448 bits.
Uniform Resource Locator (URL)
steganography
Blowfish
Domain Name
19. CAN-SPAM
Third Party
Defines legal email marketing
nslookup
Serial Line Internet Protocol (SLIP)
20. An approach to restricting system access to authorized users in which roles are created for various job functions. The permissions to perform certain operations are assigned to specific roles. Members of staff (or other system users) are assigned par
role-based access control
-PB
Wrapper
gap analysis
21. A form of fraud in which someone pretends to be someone else by assuming that person's identity - typically in order to access resources or obtain credit and other benefits in that person's name.
Internet Protocol Security (IPSec) architecture
security controls
identity theft
RPC-DCOM
22. A group of experts that handles computer security incidents.
Mantrap
session hijacking
security incident response team (SIRT)
Cache
23. Layer 6 of the OSI reference model. The Presentation layer ensures information sent by the Application layer of the sending system will be readable by the Application layer of the receiving system.
Due Diligence
parameter tampering
War Driving
Presentation layer
24. A set of hardware - software - people - policies - and procedures needed to create - manage - distribute - use - store - and revoke digital certificates.
iris scanner
Timestamping
Information Technology (IT) asset criticality
public key infrastructure (PKI)
25. An informed decision to accept the potential for damage to or loss of an IT asset.
risk acceptance
Application Layer
Block Cipher
gray box testing
26. Malicious code that uses a polymorphic engine to mutate while keeping the original algorithm intact; the code changes itself each time it runs - but the function of the code will not change.
File Allocation Table (FAT)
polymorphic virus
Exploit
public key
27. Provides data encryption for IEEE 802.11 wireless networks so data can only be decrypted by the intended recipients.
Wi-Fi Protected Access (WPA)
payload
parallel scan
404EE
28. Sending packets or requests to another system to gain information to be used to identify weaknesses and protect the system from attacks.
Brute-Force Password Attack
Decryption
reverse lookup; reverse DNS lookup
Vulnerability Scanning
29. A sublayer of layer 2 of the OSI model - the Data Link layer. It provides addressing and channel access control mechanisms that enable several terminals or network nodes to communicate within a multipoint network.
port redirection
Media Access Control (MAC)
physical security
rogue access point
30. A program designed to browse websites in an automated - methodical manner. Sometimes these programs are used to harvest information from websites - such as e-mail addresses.
Information Technology (IT) security architecture and framework
patch
Web Spider
Trusted Computer System Evaluation Criteria (TCSEC)
31. Weakness in an information system - system security procedures - internal controls - or implementation that could be exploited or triggered by a threat source.
protocol stack
reconnaissance
Vulnerability
Antivirus (AV) software
32. MAC Flooding
parallel scan
gateway
Port Address Translation (PAT)
Overwhelm CAM table to convert switch to hub mode
33. A denial-of-service technique that uses numerous hosts to perform the attack.
File Allocation Table (FAT)
Zenmap
Distributed DoS (DDoS)
Interior Gateway Protocol (IGP)
34. Policy stating what users of a system can and cannot do with the organization's assets.
patch
Exploit
Service Set Identifier (SSID)
Acceptable Use Policy (AUP)
35. An HTTP command to transmit text to a web server for processing. The opposite of an HTTP GET.
logic bomb
POST
rogue access point
pattern matching
36. Any item of value or worth to an organization - whether physical or virtual.
Community String
RID Resource identifier
Certificate Authority (CA)
Asset
37. Hex 29
U P F
Decryption
risk
Digital Certificate
38. The act of secretly listening to the private conversations of others without their consent. This can also be done over telephone lines (wiretapping) - e-mail - instant messaging - and other methods of communication considered private
source routing
Eavesdropping
personal identification number (PIN)
parallel scan & 300 sec timeout & 1.25 sec/probe
39. A collection of historical records or the place where they are kept. In computing - an archive generally refers to backup copies of logs and/or data.
Minimum acceptable level of risk
protocol stack
Archive
null session
40. A protocol for exchanging packets over a serial line.
rule-based access control
Information Technology (IT) asset valuation
Serial Line Internet Protocol (SLIP)
RID Resource identifier
41. An international organization composed of national standards bodies from over 75 countries. Developed the OSI reference model.
International Organization for Standardization (ISO)
Hypertext Transfer Protocol (HTTP)
Bluejacking
public key
42. A string that represents the location of a web resource
Uniform Resource Locator (URL)
gray hat
port redirection
Real application encompassing Trojan
43. A security protocol for wireless local area networks defined in the 802.11b standard; intended to provide the same level of security as a wired LAN. WEP is not considered strong security - although it does authenticate clients to access points - encr
POP 3
SSH
Wired Equivalent Privacy (WEP)
Application Layer
44. A wireless networking mode where all clients connect to the wireless network through a central access point.
Active Directory (AD)
infrastructure mode
Biometrics
separation of duties
45. A three-step process computers execute to negotiate a connection with one another. The three steps are SYN - SYN/ACK - ACK.
Tunneling Virus
Extensible Authentication Protocol (EAP)
Three-Way (TCP) Handshake
ad hoc mode
46. An application that monitors a computer or network to identify - and prevent - malware. AV is usually signature-based - and can take multiple actions on defined malware files/activity.
network access server
Antivirus (AV) software
Time exceeded
intrusion detection system (IDS)
47. An inspection of a place where a company or individual proposes to work - to gather the necessary information for a design or risk assessment.
Malware
Trojan Horse
Cold Site
site survey
48. A wireless access point that has either been installed on a secure company network without explicit authorization from a local network administrator - or has been created to allow a hacker to conduct a man-in-the-middle attack.
Boot Sector Virus
Assessment
rogue access point
promiscuous mode
49. A list of IP addresses and corresponding MAC addresses stored on a local computer.
Open System Interconnection (OSI) Reference Model
Address Resolution Protocol (ARP) table
-oA
false rejection rate (FRR)
50. The act of using numerous electronic serial numbers on a cell phone until a valid number is located.
Whois
Simple Mail Transfer Protocol (SMTP)
Tumbling
NOP