SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. An attack where the hacker positions himself between the client and the server - to intercept (and sometimes alter) data traveling between the two.
Man-in-the-middle attack
Last In First Out (LIFO)
net use \[target ip]IPC$ '' /user:''
Fast Ethernet
2. The secret portion of an asymmetric key pair typically used to decrypt or digitally sign data. The private key is never shared and is always used for decryption - with one notable exception: The private key is used to encrypt the digital signature.
shoulder surfing
private key
private network address
NetBus
3. A computer security expert who performs security audits and penetration tests against systems or network segments - with the owner's full knowledge and permission - in an effort to increase security.
Trojan Horse
audit
Ethical Hacker
fragmentation
4. A standard for encrypting e-mail - web pages - and other stream-oriented information transmitted over the Internet.
payload
Telnet
Transport Layer Security (TLS)
Certificate
5. The process of pinging each address within a subnet to map potential targets. Ping sweeps are unreliable and easily detectable - but very fast.
404EE
SNMP
ping sweep
separation of duties
6. A free and popular version of the Unix operating system.
Traceroute
FreeBSD
port scanning
security controls
7. The act of searching for Wi-Fi wireless networks by a person in a moving vehicle - using a portable device.
limitation of liability and remedies
Authentication
War Driving
Internet Control Message Protocol (ICMP)
8. A step-by-step method of solving a problem. In computing security - an algorithm is a set of mathematical rules (logic) for the process of encryption and decryption
reverse lookup; reverse DNS lookup
-sF
Algorithm
security kernel
9. CAN-SPAM
encapsulation
Annualized Loss Expectancy (ALE)
Defines legal email marketing
Trusted Computer Base (TCB)
10. A point of reference used to mark an initial state in order to manage change.
security kernel
Baseline
-PM
hacktivism
11. The change or growth of a project's scope
node
scope creep
pattern matching
Cryptographic Key
12. A Canonical Name record within DNS - used to provide an alias for a domain name.
Fraud and related activity in connection with computers
CNAME record
router
POST
13. LM Hash for short passwords (under 7)
Crossover Error Rate (CER)
Time Bomb
Telnet
404EE
14. A piece of code intentionally inserted into a software system that will perform a malicious function when specified conditions are met at some future point.
SMB
Distributed DoS (DDoS)
-sX
logic bomb
15. Layer 2 of the OSI reference model. This layer provides reliable transit of data across a physical link. The Data Link layer is concerned with physical addressing - network topology - access to the network medium - error detection - sequential delive
Data Link layer
initial sequence number (ISN)
routed protocol
HTTP
16. nmap
Wired Equivalent Privacy (WEP)
enumeration
limitation of liability and remedies
--randomize_hosts -O OS fingerprinting
17. LAN standard - defined by ANSI X3T9.5 - specifying a 100Mbps token-passing network using fiber-optic cable and a dualring architecture for redundancy - with transmission distances of up to two kilometers.
port knocking
Fiber Distributed Data Interface (FDDI)
File Transfer Protocol (FTP)
Transport Layer Security (TLS)
18. Port Scanning
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
19. A method of falsely identifying the source of data packets; often used by hackers to make it difficult to trace where an attack originated.
Filter
inference attack
spoofing
Collision
20. An attack against an authentication protocol in which the attacker intercepts data in transit along the network between the claimant and verifier - but does not alter the data (in other words - eavesdropping).
ISO 17799
passive attack
Accountability
Vulnerability
21. Transmitting one protocol encapsulated inside another protocol.
Warm Site
Web Spider
Tunneling
Institute of Electrical and Electronics Engineers (IEEE)
22. A symmetric key cipher where plaintext bits are combined with a pseudo-random cipher bit stream (keystream) - typically by an exclusive-or (XOR) operation. In a stream cipher the plaintext digits are encrypted one at a time - and the transformation o
Methodology
File Allocation Table (FAT)
Internet Protocol (IP)
stream cipher
23. A connectionless - layer 4 transport protocol. UDP is faster than TCP - but offers no reliability. A best effort is made to deliver the data - but no checks and verifications are performed to guarantee delivery. Therefore - UDP is termed a 'connectio
Threat
A procedure for identifying active hosts on a network.
Ethernet
User Datagram Protocol (UDP)
24. A unit of information formatted according to specific protocols that allows precise transmittal of data from one network node to another. Also called a datagram or data packet - a packet contains a header (container) and a payload (contents). Any IP
-b
secure channel
packet
Bit Flipping
25. A hardware device used to log keystrokes covertly. Hardware keystroke loggers are very dangerous due to the fact that they cannot be detected through regular software/anti-malware scanning.
Bit Flipping
hardware keystroke logger
-b
encapsulation
26. A documented process for a procedure designed to be consistent - repeatable - and accountable.
Active Attack
Methodology
quality of service (QoS)
LDAP
27. Any kind of connection that allows you to see all traffic passing by. Generally used in reference to a NIDS (network-based IDS) to monitor all traffic.
network tap
Internet Control Message Protocol (ICMP)
National Security Agency
RID Resource identifier
28. A non-self-replicating program that appears to have a useful purpose - but in reality has a different - malicious purpose.
Active Attack
Trojan Horse
Bit Flipping
null session
29. Two or more LANs connected by a high-speed line across a large geographical area.
CAM table
Wide Area Network (WAN)
encryption
Virtual Local Area Network (VLAN)
30. ICMP Type/Code 3-13
Administratively Prohibited
War Driving
penetration testing
Telnet
31. The conveying of official access or legal power to a person or entity.
Acknowledgment (ACK)
Wide Area Network (WAN)
User Datagram Protocol (UDP)
Authorization
32. A tool that helps a company to compare its actual performance with its potential performance.
Multipartite virus
gray hat
Tini
gap analysis
33. The set of all hardware - firmware - and/or software components critical to IT security. Bugs or vulnerabilities occurring inside the TCB might jeopardize the security properties of the entire system.
Algorithm
Trusted Computer Base (TCB)
shrink-wrap code attacks
XOR Operation
34. ICMP Type/Code 8
-p <port ranges>
key exchange protocol
Echo request
honeynet
35. A mode of operation for a block cipher - with the characteristic that each possible block of plaintext has a defined corresponding ciphertext value - and vice versa
Malicious code
Electronic Code Book (ECB)
SOA record
Data Link layer
36. Policy stating what users of a system can and cannot do with the organization's assets.
-oN
Auditing
Internal access to the network
Acceptable Use Policy (AUP)
37. The directory service created by Microsoft for use on itsnetworks. Provides a variety of network services using Lightweight Directory Access Protocol (LDAP) - Kerberos-based authentication - and single sign-on for user access to network-based resourc
Active Directory (AD)
-oN
Presentation layer
operating system attack
38. Malicious code that uses a polymorphic engine to mutate while keeping the original algorithm intact; the code changes itself each time it runs - but the function of the code will not change.
polymorphic virus
session splicing
Dumpster Diving
replay attack
39. The act of dialing all numbers within an organization to discover open modems.
Anonymizer
War Dialing
Tunneling Virus
public key infrastructure (PKI)
40. The process of recording activity on a system for monitoring and later review.
Biometrics
Auditing
Zone transfer
Defense in Depth
41. A business - government agency - or educational institution that provides access to the Internet.
-sV
Internet service provider (ISP)
Zenmap
Digital Certificate
42. An attack technique that tricks your DNS server into believing it has received authentic information when - in reality - it has been provided fraudulent data. DNS cache poisoning affects user traffic by sending it to erroneous or malicious end points
Point-to-Point Tunneling Protocol (PPTP)
single loss expectancy (SLE)
Domain Name System (DNS) cache poisoning
routed protocol
43. ICMP Type/Code 3
Destination Unreachable
404EE
human-based social engineering
Detective Controls
44. A limit on the amount of time or number of iterations or transmissions in computer and network technology a packet can experience before it will be discarded.
Time To Live (TTL)
War Driving
SID
flood
45. Looking over an authorized user's shoulder in order to steal information (such as authentication information).
session splicing
shoulder surfing
out-of-band signaling
Worm
46. The process of embedding information into a digital signal in a way that makes it difficult to remove.
Digital Watermarking
Three-Way (TCP) Handshake
shrink-wrap code attacks
port redirection
47. A device that provides access between two or more networks. Gateways are typically used to connect dissimilar networks.
gateway
serialize scans & 0.4 sec wait
Access Creep
Wi-Fi Protected Access (WPA)
48. A section or subset of the network. Often a router or other routing device provides the end point of the segment.
802.11
segment
Electronic serial number
SYN flood attack
49. Describes practices in production and development that promote access to the end product's source materials.
Common Internet File System/Server Message Block
A series of messages sent by someone attempting to break into a computer to learn about the computer's network services.
-sA
open source
50. Originally an extension of PPP - this is a protocol for authentication used within wireless networks. Works with multiple authentication measures.
A S
Ciphertext
Extensible Authentication Protocol (EAP)
Destination Unreachable
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests