SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The organization that governs the Internet's top-level domains - IP address allocation - and port number assignments.
Vulnerability Scanning
SYN attack
Internet Assigned Number Authority (IANA)
iris scanner
2. ex 02
Uniform Resource Locator (URL)
S
Google hacking
Ethical Hacker
3. Computer software or hardware that can intercept and log traffic passing over a digital network.
-sP
gap analysis
sniffer
CIA triangle
4. A protocol used for sending and receiving log information for nodes on a network.
spoofing
Uniform Resource Locator (URL)
Distributed DoS (DDoS)
Syslog
5. Conversion of plaintext to ciphertext through the use of a cryptographic algorithm.
FreeBSD
forwarding
steganography
encryption
6. The directory service created by Microsoft for use on itsnetworks. Provides a variety of network services using Lightweight Directory Access Protocol (LDAP) - Kerberos-based authentication - and single sign-on for user access to network-based resourc
-sU
Active Directory (AD)
Asset
Bluetooth
7. An organization's threshold for the seven areas of information security responsibility. This level is established based on the objectives for maintaining confidentiality - integrity - and availability of the organization's IT assets and infrastructur
Replacing numbers in a url to access other files
Computer-Based Attack
gap analysis
Minimum acceptable level of risk
8. A comparison metric for different biometric devices and technologies; the point at which the false acceptance rate (FAR) equals the
Demilitarized Zone (DMZ)
Access Creep
Crossover Error Rate (CER)
Simple Object Access Protocol (SOAP)
9. The process of using an application to remotely identify open ports on a system (for example - whether systems allow connections through those ports).
port scanning
Bug
Database
Collision Domain
10. A self-replicating - self-propagating - self-contained program that uses networking mechanisms to spread itself.
SYN flood attack
Worm
SOA record
encapsulation
11. Port 137/138/139
Banner Grabbing
SMB
FTP
private network address
12. nmap
parallel scan & 75 sec timeout & 0.3 sec/probe
-p <port ranges>
-oG
POST
13. A cell phone attack in which the serial number from one cell phone is copied to another in an effort to copy the cell phone.
SAM
Cloning
security breach or security incident
Videocipher II Satellite Encryption System
14. The steps taken to gather evidence and information on the targets you wish to attack.
NT LAN Manager (NTLM)
logic bomb
LDAP
reconnaissance
15. A trusted entity that issues and revokes public key certificates. In a network - a CA is a trusted entity that issues - manages - and revokes security credentials and public keys for message encryption and/or authentication. Within a public key infra
flood
Certificate Authority (CA)
ISO 17799
Vulnerability Scanning
16. Safeguards or countermeasures to avoid - counteract - or minimize security risks.
Multipurpose Internet Mail Extensions (MIME)
-b
audit
security controls
17. An encryption standard designed by Joan Daemen and Vincent Rijmen. Chosen by a NIST contest to be the Advanced Encryption Standard (AES).
EDGAR database
Smurf attack
self encrypting
Rijndael
18. A defined measure of service within a network system
footprinting
Asymmetric
Vulnerability Management
quality of service (QoS)
19. A tool that helps a company to compare its actual performance with its potential performance.
gap analysis
-p <port ranges>
U P F
stream cipher
20. A program designed to browse websites in an automated - methodical manner. Sometimes these programs are used to harvest information from websites - such as e-mail addresses.
Web Spider
End User Licensing Agreement (EULA)
private network address
Domain Name System (DNS)
21. An adapter that provides the physical connection to send and receive data between the computer and the network media.
-sP
Due Care
-sL
network interface card (NIC)
22. A point-to-point connection between two endpoints created to exchangedata. Typically a tunnel is either an encrypted connection - or a connection using a protocol in a method for which it was not designed. An encrypted connection forms a point-to-poi
Media Access Control (MAC)
Banner Grabbing
Tunnel
Request for Comments (RFC)
23. A simple PPP authentication mechanism in which the user name and password are transmitted in clear text to prove identity. PAP compares the user name and password to a table listing authorized users.
Password Authentication Protocol (PAP)
Mantrap
Wireless Local Area Network (WLAN)
separation of duties
24. The act of searching for Wi-Fi wireless networks by a person in a moving vehicle - using a portable device.
War Driving
session splicing
Hacks with permission
enumeration
25. A cyber attacker who acts without permission from - and gives prior notice to - the resource owner. Also known as a malicious hacker.
Cracker
remote access
source routing
Bluejacking
26. The use of deceptive computer-based means to trick individuals into disclosing sensitive personal information
Daemon
iris scanner
Cold Site
phishing
27. MAC Flooding
honeypot
route
Overwhelm CAM table to convert switch to hub mode
Discretionary Access Control (DAC)
28. The process of pinging each address within a subnet to map potential targets. Ping sweeps are unreliable and easily detectable - but very fast.
overt channel
risk assessment
ping sweep
Level I assessment
29. Terminal Access Controller Access-Control System. A remote authentication protocol that is used to communicate with an authentication server commonly used in Unix networks.
Third Party
TACACS
HTTP
Asymmetric
30. An authentication method on point-to-point links - using a three-way handshake and a mutually agreed-upon key.
session hijacking
Challenge Handshake Authentication Protocol (CHAP)
DNS
Black Box Testing
31. An approach to restricting system access to authorized users in which roles are created for various job functions. The permissions to perform certain operations are assigned to specific roles. Members of staff (or other system users) are assigned par
role-based access control
Service Set Identifier (SSID)
LDAP
Bug
32. A storage buffer that transparently stores data so future requests for the same data can be served faster.
Cache
Media Access Control (MAC)
Virtual Local Area Network (VLAN)
ISO 17799
33. Window Scan
Multipartite virus
-sW
-oG
Domain Name
34. Devices - connected to one or more switches - grouped logically into a single broadcast domain. VLANs enable administrators to divide the devices connected to the switches into multiple VLANs without requiring separate physical switches.
-sS
Virtual Local Area Network (VLAN)
hacktivism
polymorphic virus
35. Port Scanning
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
36. A small Trojan program that listens on port 777.
Back orifice
nslookup
Wireless Local Area Network (WLAN)
Tini
37. A standard for encrypting and authenticating MIME data; used primarily for Internet e-mail.
symmetric encryption
Secure Multipurpose Mail Extension (S/MIME)
security defect
Eavesdropping
38. An Ethernet networking system transmitting data at 100 million bits per second (Mbps) - 10 times the speed of an earlier Ethernet standard. Derived from the Ethernet 802.3 standard - it is also known as 100BaseT.
smart card
SYN attack
Hacks without permission
Fast Ethernet
39. Part of a service contract where the level of service is formally defined; may be required as part of the initial pen test agreements.
Serial Line Internet Protocol (SLIP)
A S
service level agreements (SLAs)
Wireless Local Area Network (WLAN)
40. Looking over an authorized user's shoulder in order to steal information (such as authentication information).
Application Layer
fully qualified domain name (FQDN)
shoulder surfing
Active Fingerprinting
41. LAN standard - defined by ANSI X3T9.5 - specifying a 100Mbps token-passing network using fiber-optic cable and a dualring architecture for redundancy - with transmission distances of up to two kilometers.
Authentication Header (AH)
keylogger
Fiber Distributed Data Interface (FDDI)
S
42. A type of denial-of-service attack where a hacker sends thousands of SYN packets to the target with spoofed IP addresses.
Boot Sector Virus
hardware keystroke logger
SYN attack
parallel scan & 300 sec timeout & 1.25 sec/probe
43. Whether purposeful or the result of malware or other attack - a backdoor is a hidden capability in a system or program for bypassing normal computer authentication systems.
protocol
Backdoor
Crossover Error Rate (CER)
Black Hat
44. A business - government agency - or educational institution that provides access to the Internet.
Internet service provider (ISP)
Data Link layer
session hijacking
protocol
45. A security tool designed to protect a system or network against attacks by comparing traffic patterns against a list of both known attack signatures and general characteristics of how attacks may be carried out. Threats are rated and reported.
Corrective Controls
-sL
intrusion detection system (IDS)
footprinting
46. A technology that establishes a tunnel to create a private - dedicated - leased-line network over the Internet. The data is encrypted so it's readable only by the sender and receiver. Companies commonly use VPNs to allow employees to connect securely
File Transfer Protocol (FTP)
session hijacking
Virtual Private Network (VPN)
spam
47. An announcement - typically from a software vendor - of a known security vulnerability in a program; often the bulletin contains instructions for the application of a software patch.
honeypot
Presentation layer
-sU
security bulletins
48. A denial-of-service attack where the attacker sends a ping to the network's broadcast address from the spoofed IP address of the target. All systems in the subnet then respond to the spoofed address - eventually flooding the device.
Smurf attack
Methodology
Certificate
End User Licensing Agreement (EULA)
49. Shifting responsibility from one party to another
risk avoidance
Exposure Factor
risk transference
DNS enumeration
50. An attack where the hacker repeats a portion of a cryptographic exchange in hopes of fooling the system into setting up a communications channel.
network tap
replay attack
serialize scans & 15 sec wait
Zone transfer
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests