SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A symmetric - block-cipher data-encryption standard that uses a variablelength key that can range from 32 bits to 448 bits.
Packet Internet Groper (ping)
Blowfish
Daemon
Smurf attack
2. A virus that plants itself in a system's boot sector and infects the master boot record.
CNAME record
Trojan Horse
Boot Sector Virus
Third Party
3. The level of importance assigned to an IT asset
Digital Certificate
The automated process of proactively identifying vulnerabilities of computing systems present in a network
source routing
Information Technology (IT) asset criticality
4. A method of external testing whereby several systems or resources are used together to effect an attack.
rootkit
Annualized Loss Expectancy (ALE)
Daisy Chaining
Wide Area Network (WAN)
5. Any network incident that prompts some kind of log entry or other notification.
Tunnel
Availability
Event
ECHO reply
6. An organization's threshold for the seven areas of information security responsibility. This level is established based on the objectives for maintaining confidentiality - integrity - and availability of the organization's IT assets and infrastructur
Community String
-sW
Minimum acceptable level of risk
Competitive Intelligence
7. Establish Null Session
parameter tampering
Domain Name System (DNS) lookup
network operations center (NOC)
net use \[target ip]IPC$ '' /user:''
8. Nmap ml output
-oX
Daemon
hot site
Biometrics
9. A device set up to send a response on behalf of an end node to the requesting host. Proxies are generally used to obfuscate the host from the Internet.
proxy server
network access server
File Transfer Protocol (FTP)
Wireless Local Area Network (WLAN)
10. Port Scanning
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
11. A mathematical operation requiring two binary inputs: If the inputs match - the output is a 0 - otherwise it is a 1.
Information Technology (IT) asset criticality
RPC-DCOM
XOR Operation
Hypertext Transfer Protocol Secure (HTTPS)
12. Sending packets or requests to another system to gain information to be used to identify weaknesses and protect the system from attacks.
Baseline
Target Of Engagement (TOE)
intrusion prevention system (IPS)
Vulnerability Scanning
13. SYN Ping
-PS
RPC-DCOM
node
payload
14. TCP Ping
Mantrap
-PT
Smurf attack
Challenge Handshake Authentication Protocol (CHAP)
15. A piece of software - provided by the vendor - intended to update or fix known - discovered problems in a computer program or its supporting data.
false rejection rate (FRR)
key exchange protocol
A
patch
16. Port 31337
network interface card (NIC)
routed protocol
Back orifice
Port Address Translation (PAT)
17. don't ping
Electronic Code Book (ECB)
Cloning
Time Bomb
-P0
18. A method used to prevent IDS detection by dividing the request into multiple parts that are sent in different packets
-sR
session splicing
404EE
Algorithm
19. A type of malware that covertly collects information about a user.
Information Technology (IT) infrastructure
Trapdoor Function
spyware
Finding a directory listing and gaining access to a parent or root file for access to other files
20. Version Detection Scan
-sV
Level I assessment
Dumpster Diving
Banner Grabbing
21. Any kind of connection that allows you to see all traffic passing by. Generally used in reference to a NIDS (network-based IDS) to monitor all traffic.
Asynchronous
Tiger Team
Active Fingerprinting
network tap
22. A card with a built-in microprocessor and memory used for identification or financial transactions. The card transfers data to and from a central computer when inserted into a reader.
ad hoc mode
smart card
Internet Assigned Number Authority (IANA)
R
23. An industry standard protocol used for accessing and managing information within a directory service; an application protocol for querying and modifying data using directory services running over TCP/IP.
Access Point (AP)
fragmentation
Lightweight Directory Access Protocol (LDAP)
-PP
24. A penetration test in which the ethical hacker has limited knowledge of the intended target(s). Designed to simulate an internal - but non-systemadministrator-level attack.
Wiretapping
Media Access Control (MAC)
gray box testing
Bluesnarfing
25. ICMP Ping
session hijacking
HIDS
Last In First Out (LIFO)
-PI
26. A U.S. Department of Defense (DoD) standard that sets basic requirements for assessing the effectiveness of computer security controls built into a computer system.
Trusted Computer System Evaluation Criteria (TCSEC)
Domain Name System (DNS)
Banner Grabbing
serial scan & 300 sec wait
27. Ports 20/21
suicide hacker
SMB
Bluesnarfing
FTP
28. A form of fraud in which someone pretends to be someone else by assuming that person's identity - typically in order to access resources or obtain credit and other benefits in that person's name.
Master boot record infector
identity theft
Backdoor
Digital Watermarking
29. Nmap grepable output
Demilitarized Zone (DMZ)
-oG
Cryptography
Internal access to the network
30. Activities to determine the extent to which a security control is implemented correctly - operating as intended - and producing the desired outcome with respect to meeting the security requirements for the system.
spoofing
security kernel
Assessment
gray box testing
31. ICMP Type/Code 0-0
spam
Bluesnarfing
Echo Reply
Contingency Plan
32. A fully operational off-site data-processing facility equipped with hardware and system software to be used in the event of a disaster.
-oN
hot site
War Dialing
Zero Subnet
33. A denial-of-service technique that uses numerous hosts to perform the attack.
Simple Object Access Protocol (SOAP)
Distributed DoS (DDoS)
Bluetooth
intrusion prevention system (IPS)
34. A physical security attack where the attacker sifts through garbage and recycle bins for information that may be useful on current and future attacks
Institute of Electrical and Electronics Engineers (IEEE)
Dumpster Diving
footprinting
RxBoot
35. Phases of an attack
false rejection rate (FRR)
security by obscurity
Reconnaissance - Scanning - Gaining Access - Maintaining Access - Covering Tracks
Third Party
36. A cyber attacker who acts without permission from - and gives prior notice to - the resource owner. Also known as a malicious hacker.
Cracker
Auditing
security breach or security incident
Routing Information Protocol (RIP)
37. A nontechnical method of hacking. Social engineering is the art of manipulating people - whether in person (human-based) or via computing methods (computer-based) - into providing sensitive information.
Back orifice
social engineering
Virus Hoax
Internet Control Message Protocol (ICMP)
38. Whether purposeful or the result of malware or other attack - a backdoor is a hidden capability in a system or program for bypassing normal computer authentication systems.
Whois
Backdoor
-PT
private key
39. Unauthorized access to information such as a calendar - contact list - e-mails - and text messages on a wireless device through a Bluetooth connection.
Data Encryption Standard (DES)
gap analysis
Bluesnarfing
route
40. A computer network confined to a relatively small area - such as a single building or campus - in which devices connect through high-frequency radio waves using IEEE standard 802.11.
spyware
steganography
Wireless Local Area Network (WLAN)
session splicing
41. A symmetric key cipher where plaintext bits are combined with a pseudo-random cipher bit stream (keystream) - typically by an exclusive-or (XOR) operation. In a stream cipher the plaintext digits are encrypted one at a time - and the transformation o
stream cipher
Asymmetric
Client
Countermeasures
42. An organized collection of data.
gateway
initial sequence number (ISN)
Bluetooth
Database
43. A biometric device that uses pattern-recognition techniques based on images of the irises of an individual's eyes.
forwarding
iris scanner
firewalking
site survey
44. Authentication confirms the identity of the user or device. Authorization determines the privileges (rights) of the user or device. Accounting records the access attempts - both successful and unsuccessful.
network access server
Digital Certificate
Authentication - Authorization - and Accounting (AAA)
segment
45. LAN standard - defined by ANSI X3T9.5 - specifying a 100Mbps token-passing network using fiber-optic cable and a dualring architecture for redundancy - with transmission distances of up to two kilometers.
Fiber Distributed Data Interface (FDDI)
Virtual Private Network (VPN)
Wi-Fi Protected Access (WPA)
Corrective Controls
46. A self-replicating - self-propagating - self-contained program that uses networking mechanisms to spread itself.
Smurf attack
TACACS
Worm
security bulletins
47. A wireless access point that has either been installed on a secure company network without explicit authorization from a local network administrator - or has been created to allow a hacker to conduct a man-in-the-middle attack.
Hacks with permission
CIA triangle
rogue access point
Tunneling Virus
48. An attack where the hacker manipulates parameters within the URL string in hopes of modifying data.
net use \[target ip]IPC$ '' /user:''
POST
parameter tampering
fragmentation
49. A method in cryptography by which cryptographic keys are exchanged between users - allowing use of a cryptographic algorithm (for example - the Diffie-Hellman key exchange).
Replacing numbers in a url to access other files
rogue access point
key exchange protocol
-sO
50. A technology that establishes a tunnel to create a private - dedicated - leased-line network over the Internet. The data is encrypted so it's readable only by the sender and receiver. Companies commonly use VPNs to allow employees to connect securely
Tunneling Virus
-PS
Virtual Private Network (VPN)
Web Spider
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests