SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Nmap normal output
False Acceptance Rate (FAR)
penetration testing
Presentation layer
-oN
2. UDP Scan
-oN
Application Layer
-sU
Wiretapping
3. A wireless access point that has either been installed on a secure company network without explicit authorization from a local network administrator - or has been created to allow a hacker to conduct a man-in-the-middle attack.
Bluejacking
rogue access point
-sP
parallel scan & 300 sec timeout & 1.25 sec/probe
4. Layer 6 of the OSI reference model. The Presentation layer ensures information sent by the Application layer of the sending system will be readable by the Application layer of the receiving system.
Event
INFOSEC Assessment Methodology (IAM)
Presentation layer
Information Technology (IT) infrastructure
5. White hat
payload
Hacks with permission
Tiger Team
pattern matching
6. A system used by the Securities and Exchange Commission (SEC) for companies and businesses to transmit required filings and information. The EDGAR database performs automated collection - validation - indexing - acceptance - and forwarding of submiss
EDGAR database
Web Spider
source routing
Black Hat
7. A term trademarked by the Wi-Fi Alliance - used to define a standard for devices to use to connect to a wireless network.
Digital Signature
Domain Name
serialize scans & 15 sec wait
Wi-Fi
8. Xmas Tree scan
Asymmetric
-sX
-PI
Fast Ethernet
9. A backup facility with the electrical and physical components of a computer facility - but with no computer equipment in place. The site is ready to receive the necessary replacement computer equipment in the event the user has to move from his main
security incident response team (SIRT)
source routing
Challenge Handshake Authentication Protocol (CHAP)
Cold Site
10. A computer virus that infects and spreads in multiple ways.
Multipartite virus
-sR
A series of messages sent by someone attempting to break into a computer to learn about the computer's network services.
-sU
11. A standard for encrypting and authenticating MIME data; used primarily for Internet e-mail.
quality of service (QoS)
Secure Multipurpose Mail Extension (S/MIME)
CIA triangle
Application-Level Attacks
12. A protocol used for sending and receiving log information for nodes on a network.
Overwhelm CAM table to convert switch to hub mode
session hijacking
Defense in Depth
Syslog
13. The monetary loss that can be expected for an asset due to risk over a one-year period. ALE is the product of the annual rate of occurrence (ARO) and the single loss expectancy (SLE). It is mathematically expressed as ALE = ARO
Auditing
Console Port
Biometrics
Annualized Loss Expectancy (ALE)
14. A method of external testing whereby several systems or resources are used together to effect an attack.
CIA triangle
Daisy Chaining
Real application encompassing Trojan
Detective Controls
15. Layer 2 of the OSI reference model. This layer provides reliable transit of data across a physical link. The Data Link layer is concerned with physical addressing - network topology - access to the network medium - error detection - sequential delive
Crossover Error Rate (CER)
Fast Ethernet
Data Link layer
physical security
16. A documented process for a procedure designed to be consistent - repeatable - and accountable.
Methodology
Active Directory (AD)
EDGAR database
script kiddie
17. Wireless LAN standards created by IEEE. 802.11a runs at up to 54Mbps at 5GHz - 802.11b runs at 11Mbps at 2.4GHz - 802.11g runs at 54Mbps at 2.4GHz - and 802.11n can run upwards of 150MBps.
Post Office Protocol 3 (POP3)
Trapdoor Function
promiscuous mode
802.11
18. Drawing symbols in public places to alert others to an open Wi-Fi network. War chalking can include the SSIDs - administrative passwords to APs - and other information.
End User Licensing Agreement (EULA)
War Chalking
risk
Tunnel
19. Whether purposeful or the result of malware or other attack - a backdoor is a hidden capability in a system or program for bypassing normal computer authentication systems.
proxy server
Backdoor
Vulnerability
Black Hat
20. A series of documents and notes on standards used or proposed for use on the Internet; each is identified by a number.
sheepdip
Address Resolution Protocol (ARP) table
Request for Comments (RFC)
Temporal Key Integrity Protocol (TKIP)
21. ICMP Timestamp
-PP
replay attack
segment
Presentation layer
22. A Unix-like computer operating system descending from the BSD. Open-BSD includes a number of security features absent or optional in other operating systems.
Electronic serial number
Three-Way (TCP) Handshake
OpenBSD
Assessment
23. Transmission using channels or frequencies outside those normally used for data transfer; often used for error reporting.
Hierarchical File System (HFS)
out-of-band signaling
non-repudiation
Virtual Local Area Network (VLAN)
24. Any network incident that prompts some kind of log entry or other notification.
RxBoot
Antivirus (AV) software
No previous knowledge of the network
Event
25. A protocol for transporting data packets across a packet switched internetwork (such as the Internet). IP is a routed protocol.
SNMP
Internet Protocol (IP)
Post Office Protocol 3 (POP3)
Archive
26. An industry standard protocol used for accessing and managing information within a directory service; an application protocol for querying and modifying data using directory services running over TCP/IP.
public key infrastructure (PKI)
Lightweight Directory Access Protocol (LDAP)
limitation of liability and remedies
Third Party
27. A nonnumerical - subjective risk evaluation. Used with qualitative assessment (an evaluation of risk that results in ratings of none - low - medium - and high for the probability.)
HTTP
Last In First Out (LIFO)
Point-to-Point Tunneling Protocol (PPTP)
qualitative analysis
28. Port Scanning
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
29. A connectionless - layer 4 transport protocol. UDP is faster than TCP - but offers no reliability. A best effort is made to deliver the data - but no checks and verifications are performed to guarantee delivery. Therefore - UDP is termed a 'connectio
Certificate
red team
FreeBSD
User Datagram Protocol (UDP)
30. 18 U.S.C. 1029
service level agreements (SLAs)
Extensible Authentication Protocol (EAP)
Possession of access devices
port knocking
31. A software license agreement; a contract between the 'licensor' and purchaser establishing the right to use the software.
End User Licensing Agreement (EULA)
Temporal Key Integrity Protocol (TKIP)
SYN flood attack
Event
32. The secret portion of an asymmetric key pair typically used to decrypt or digitally sign data. The private key is never shared and is always used for decryption - with one notable exception: The private key is used to encrypt the digital signature.
Fiber Distributed Data Interface (FDDI)
security by obscurity
parameter tampering
private key
33. CAN-SPAM
Defines legal email marketing
Authentication
Bug
site survey
34. Port 389
LDAP
script kiddie
Zenmap
Tini
35. An Internet Protocol Security (IPSec) header used to verify that the contents of a packet have not been modified while the packet was in transit.
Authentication Header (AH)
MAC filtering
Interior Gateway Protocol (IGP)
Target Of Engagement (TOE)
36. An announcement - typically from a software vendor - of a known security vulnerability in a program; often the bulletin contains instructions for the application of a software patch.
patch
Media Access Control (MAC)
Mantrap
security bulletins
37. A person or entity indirectly involved in a relationship between two principles.
Interior Gateway Protocol (IGP)
INFOSEC Assessment Methodology (IAM)
User Datagram Protocol (UDP)
Third Party
38. A computer network confined to a relatively small area - such as a single building or campus - in which devices connect through high-frequency radio waves using IEEE standard 802.11.
parallel scan & 300 sec timeout & 1.25 sec/probe
Wireless Local Area Network (WLAN)
forwarding
Cryptographic Key
39. Formerly Redundant Array of Inexpensive Disks; a technology that provides increased storage functions and reliability through redundancy. This is achieved by combining multiple disk drive components into a logical unit - where data is distributed acr
Minimum acceptable level of risk
Redundant Array of Independent Disks (RAID)
Multipurpose Internet Mail Extensions (MIME)
Annualized Loss Expectancy (ALE)
40. A networking configuration where all nodes are connected in a circle with no terminated ends on the cable.
inference attack
Target Of Engagement (TOE)
ring topology
Mandatory access control (MAC)
41. Computer software or hardware that can intercept and log traffic passing over a digital network.
Anonymizer
Collision Domain
sniffer
Address Resolution Protocol (ARP) table
42. NSA
nslookup
security defect
National Security Agency
Acceptable Use Policy (AUP)
43. An API that provides services related to the OSI model's Session layer - allowing applications on separate computers to communicate over a LAN.
firewall
Routing Protocol
Network Basic Input/Output System (NetBIOS)
Cryptography
44. Port 110
Directory Traversal
Echo request
POP 3
Hierarchical File System (HFS)
45. A nonroutable IP address range intended for use only within the confines of a single organization - falling within the predefined ranges of 10.0.0.0 - 172.16-31.0.0 - or 192.168.0.0.
SOA record
File Allocation Table (FAT)
Time Bomb
private network address
46. A mathematical operation requiring two binary inputs: If the inputs match - the output is a 0 - otherwise it is a 1.
Malicious code
SAM
XOR Operation
No previous knowledge of the network
47. A communications protocol used for browsing the Internet.
Hypertext Transfer Protocol (HTTP)
-p <port ranges>
Blowfish
Application-Level Attacks
48. MAC Flooding
penetration testing
encryption
Overwhelm CAM table to convert switch to hub mode
Secure Multipurpose Mail Extension (S/MIME)
49. A cryptographic attack where bits are manipulated in the ciphertext itself to generate a predictable outcome in the plaintext once it is decrypted.
Annualized Loss Expectancy (ALE)
Bit Flipping
Baseline
Warm Site
50. RPC Scan
-sR
integrity
Antivirus (AV) software
Daemon