SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A standard for encrypting and authenticating MIME data; used primarily for Internet e-mail.
Secure Multipurpose Mail Extension (S/MIME)
Decryption
OpenBSD
physical security
2. Port Scanning
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
3. Using conversation or some other interaction between people to gather useful information.
operating system attack
File Allocation Table (FAT)
human-based social engineering
Man-in-the-middle attack
4. A protocol for exchanging packets over a serial line.
reconnaissance
Serial Line Internet Protocol (SLIP)
-sF
parameter tampering
5. Also known as a digital certificate - this is an electronic file used to verify a user's identity - providing non-repudiation throughout the system It is also a set of data that uniquely identifies an entity. Certificates contain the entity's public
A
Antivirus (AV) software
Certificate
Threat
6. The potential for damage to or loss of an IT asset
Black Box Testing
Active Fingerprinting
Anonymizer
risk
7. Name given to expert groups that handle computer security incidents.
phishing
Computer Emergency Response Team (CERT)
-PB
Vulnerability Management
8. A protocol that uses a private key to encrypt data before transmitting confidential documents over the Internet; widely used on e-commerce - banking - and other sites requiring privacy.
-oA
serialize scans & 15 sec wait
Zenmap
Secure Sockets Layer (SSL)
9. A section or subset of the network. Often a router or other routing device provides the end point of the segment.
passive attack
Wide Area Network (WAN)
segment
Backdoor
10. A cyber attacker who acts without permission from - and gives prior notice to - the resource owner. Also known as a malicious hacker.
Cracker
parallel scan & 75 sec timeout & 0.3 sec/probe
Corrective Controls
HIDS
11. Any item of value or worth to an organization - whether physical or virtual.
payload
Computer Emergency Response Team (CERT)
Asset
quantitative risk assessment
12. A computer network confined to a relatively small area - such as a single building or campus - in which devices connect through high-frequency radio waves using IEEE standard 802.11.
Wireless Local Area Network (WLAN)
Network Basic Input/Output System (NetBIOS)
Data Link layer
Challenge Handshake Authentication Protocol (CHAP)
13. An international organization composed of national standards bodies from over 75 countries. Developed the OSI reference model.
SMB
International Organization for Standardization (ISO)
CNAME record
protocol
14. The act of searching for Wi-Fi wireless networks by a person in a moving vehicle - using a portable device.
Console Port
War Driving
--randomize_hosts -O OS fingerprinting
Sign in Seal
15. A collection of historical records or the place where they are kept. In computing - an archive generally refers to backup copies of logs and/or data.
Network Basic Input/Output System (NetBIOS)
SAM
Telnet
Archive
16. An evaluation consisting of a document review - interviews - and demonstrations - as well as vulnerability scans and hands-on testing.
rule-based access control
parameter tampering
Mandatory access control (MAC)
Level II assessment
17. A Canonical Name record within DNS - used to provide an alias for a domain name.
Internet Protocol (IP)
Cache
RxBoot
CNAME record
18. A device on a network.
firewall
Anonymizer
Secure Multipurpose Mail Extension (S/MIME)
node
19. FIN Scan
fragmentation
-sF
CIA triangle
Auditing
20. A value assigned to uniquely identify a single wide area network (WAN) in wireless LANs. SSIDs are broadcast by default - and are sent in the header of every packet. SSIDs provide no encryption or security.
SOA record
Service Set Identifier (SSID)
segment
Asymmetric Algorithm
21. A device that receives and sends data packets between two or more networks; the packet headers and a forwarding table provide the router with the information necessary for deciding which interface to use to forward packets.
router
Denial of Service (DoS)
Ethical Hacker
stateful packet filtering
22. The subjective - potential percentage of loss to a specific asset if a specific threat is realized. The exposure factor (EF) is a subjective value the person assessing risk must define.
Exposure Factor
Active Directory (AD)
Authentication
Interior Gateway Protocol (IGP)
23. A well-known and studied phenomenon of human nature - whereby a single trait influences the perception of other traits.
audit
halo effect
Wired Equivalent Privacy (WEP)
-sR
24. Black box test
inference attack
operating system attack
No previous knowledge of the network
Time To Live (TTL)
25. Port 135
Dumpster Diving
Acceptable Use Policy (AUP)
RPC-DCOM
-sT
26. An Internet Protocol Security (IPSec) header used to verify that the contents of a packet have not been modified while the packet was in transit.
Acceptable Use Policy (AUP)
Authentication Header (AH)
Denial of Service (DoS)
routed protocol
27. An attack where the hacker manipulates parameters within the URL string in hopes of modifying data.
Active Fingerprinting
ring topology
intranet
parameter tampering
28. A pen testing method where the attacker knows all information about the internal network. It is designed to simulate an attack by a disgruntled systems administrator - or similar level.
White Box Testing
Lightweight Directory Access Protocol (LDAP)
Self Replicating
Buffer
29. Injecting traffic into the network to identify the operating system of a device.
SMB
Active Fingerprinting
open source
Tunnel
30. Port 389
LDAP
false negative
A series of messages sent by someone attempting to break into a computer to learn about the computer's network services.
Macro virus
31. A software or hardware defect that often results in system vulnerabilities.
limitation of liability and remedies
operating system attack
Bug
ECHO reply
32. A network deployed as a trap to detect - deflect - or deter unauthorized use of information systems.
public key
Echo request
Presentation layer
honeynet
33. A set of rules defined by a system administrator that indicates whether access is allowed or denied to resource objects.
-sV
-sF
rule-based access control
network operations center (NOC)
34. A term trademarked by the Wi-Fi Alliance - used to define a standard for devices to use to connect to a wireless network.
Wi-Fi
Copyright
Bug
-PM
35. A systematic process for the assessment of security vulnerabilities.
End User Licensing Agreement (EULA)
Hypertext Transfer Protocol (HTTP)
INFOSEC Assessment Methodology (IAM)
Bluetooth
36. A background process found in Unix - Linux - Solaris - and other Unix-based operating systems.
Daemon
Syslog
Rijndael
SYN flood attack
37. Paranoid scan timing
Zone transfer
hardware keystroke logger
serial scan & 300 sec wait
Smurf attack
38. A step-by-step method of solving a problem. In computing security - an algorithm is a set of mathematical rules (logic) for the process of encryption and decryption
spam
Wi-Fi Protected Access (WPA)
Algorithm
Access Creep
39. A VPN tunneling protocol with encryption. PPTP connects two nodes in a VPN by using one TCP port for negotiation and authentication and one IP protocol for data transfer.
heuristic scanning
Point-to-Point Tunneling Protocol (PPTP)
Password Authentication Protocol (PAP)
logic bomb
40. A tool that helps a company to compare its actual performance with its potential performance.
U P F
Finding a directory listing and gaining access to a parent or root file for access to other files
Vulnerability Scanning
gap analysis
41. The exploitation of a security vulnerability
security incident response team (SIRT)
Directory Traversal
CNAME record
security breach or security incident
42. A method of evaluating the security of a computer system or network by simulating an attack from a malicious source.
honeypot
Cache
rule-based access control
penetration testing
43. The rate at which a biometric system will incorrectly reject an access attempt by an authorized user.
network tap
false rejection rate (FRR)
spyware
-sP
44. Security identifier. The method by which Windows identifies user - group - and computer accounts for rights and permissions.
Fiber Distributed Data Interface (FDDI)
Wireless Local Area Network (WLAN)
SID
spoofing
45. A string that represents the location of a web resource
Uniform Resource Locator (URL)
A
Asset
Three-Way (TCP) Handshake
46. A function that is easy to compute in one direction - yet believed to be difficult to compute in the opposite direction (finding its inverse) without special information - called the 'trapdoor.' Widely used in cryptography.
overt channel
Contingency Plan
Trapdoor Function
Auditing
47. A computer network confined to a relatively small area - such as a single building or campus.
-oG
local area network (LAN)
War Dialing
encapsulation
48. IP Protocol Scan
proxy server
Routing Protocol
Serial Line Internet Protocol (SLIP)
-sO
49. A symmetric - block-cipher data-encryption standard that uses a variablelength key that can range from 32 bits to 448 bits.
Service Set Identifier (SSID)
flood
passive attack
Blowfish
50. A security tool designed to protect a system or network against attacks by comparing traffic patterns against a list of both known attack signatures and general characteristics of how attacks may be carried out. Threats are rated and protective measu
Access Creep
Bit Flipping
intrusion prevention system (IPS)
Computer-Based Attack
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests