SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Layer 6 of the OSI reference model. The Presentation layer ensures information sent by the Application layer of the sending system will be readable by the Application layer of the receiving system.
Archive
Hierarchical File System (HFS)
Presentation layer
Replacing numbers in a url to access other files
2. A secret - typically consisting of only decimal digits - that a claimant memorizes and uses to authenticate his identity
802.11 i
personal identification number (PIN)
POST
Secure Multipurpose Mail Extension (S/MIME)
3. A software or hardware defect that often results in system vulnerabilities.
Bug
Sign in Seal
SOA record
public key
4. Using conversation or some other interaction between people to gather useful information.
human-based social engineering
firewall
Tini
Backdoor
5. A standard that provides best-practice recommendations on information security management for use by those responsible for initiating - implementing - or maintaining Information Security Management Systems (ISMS). Information security is defined with
ISO 17799
Dumpster Diving
Administratively Prohibited
The automated process of proactively identifying vulnerabilities of computing systems present in a network
6. An evaluation consisting of a document review - interviews - and demonstrations. No hands-on testing is performed.
Domain Name System (DNS) cache poisoning
penetration testing
Level I assessment
security incident response team (SIRT)
7. Attacks that take advantage of the built-in code and scripts most off-the-shelf applications come with.
FTP
CIA triangle
shoulder surfing
shrink-wrap code attacks
8. Port 161/162
local area network (LAN)
SNMP
Trusted Computer Base (TCB)
Malicious code
9. Port Scanning
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
10. A text file stored within a browser by a web server that maintains information about the connection. Cookies are used to store information to maintain a unique but consistent surfing experience - but can also contain authentication parameters. Cookie
Cookie
local area network (LAN)
Asynchronous
Competitive Intelligence
11. A U.S. Department of Defense (DoD) standard that sets basic requirements for assessing the effectiveness of computer security controls built into a computer system.
Trusted Computer System Evaluation Criteria (TCSEC)
router
Crossover Error Rate (CER)
qualitative analysis
12. An e-mail protection method using a secret message or image that can be referenced on any official communication with the site; if an e-mail is received without the image or message - the recipient knows it is not legitimate.
scope creep
Sign in Seal
404EE
Corrective Controls
13. A one-way mathematical function that generates a fixedlength numerical string (hash) from a given data input. MD5 and SHA-1 are hashing algorithms.
LDAP
Information Technology Security Evaluation Criteria (ITSEC)
hashing algorithm
Malware
14. An adapter that provides the physical connection to send and receive data between the computer and the network media.
Competitive Intelligence
Time Bomb
network interface card (NIC)
reverse lookup; reverse DNS lookup
15. Also known as a public key certificate - this is an electronic file that is used to verify a user's identity - providing non-repudiation throughout the sys-tem. Certificates contain the entity's public key - serial number - version - subject - algori
intranet
keylogger
-PS
Digital Certificate
16. An Internet Protocol Security (IPSec) header used to verify that the contents of a packet have not been modified while the packet was in transit.
physical security
Domain Name System (DNS) cache poisoning
Authentication Header (AH)
Access Point (AP)
17. A cryptographic attack where bits are manipulated in the ciphertext itself to generate a predictable outcome in the plaintext once it is decrypted.
Bit Flipping
spam
Filter
Crossover Error Rate (CER)
18. An API that provides services related to the OSI model's Session layer - allowing applications on separate computers to communicate over a LAN.
security kernel
Acceptable Use Policy (AUP)
Time exceeded
Network Basic Input/Output System (NetBIOS)
19. Security measures - such as a locked door - perimeter fence - or security guard - to prevent or deter physical access to a facility - resource - or information stored on physical media.
physical security
net use \[target ip]IPC$ '' /user:''
packet
Echo request
20. A means of restricting access to system resources based on the sensitivity (as represented by a label) of the information contained in the system resource and the formal authorization (that is - clearance) of users to access information of such sensi
Mandatory access control (MAC)
FreeBSD
U P F
key exchange protocol
21. The change or growth of a project's scope
Master boot record infector
scope creep
Malware
Minimum acceptable level of risk
22. White box test
rootkit
CIA triangle
Internal access to the network
Multipurpose Internet Mail Extensions (MIME)
23. A set of hardware - software - people - policies - and procedures needed to create - manage - distribute - use - store - and revoke digital certificates.
intranet
public key infrastructure (PKI)
Daemon
patch
24. A mathematical operation requiring two binary inputs: If the inputs match - the output is a 0 - otherwise it is a 1.
The automated process of proactively identifying vulnerabilities of computing systems present in a network
network tap
XOR Operation
-oX
25. An encryption standard designed by Joan Daemen and Vincent Rijmen. Chosen by a NIST contest to be the Advanced Encryption Standard (AES).
Rijndael
A series of messages sent by someone attempting to break into a computer to learn about the computer's network services.
serialize scans & 0.4 sec wait
gateway
26. Port 80/81/8080
Transport Layer Security (TLS)
key exchange protocol
-PS
HTTP
27. A technology where you advertise one IP address externally and data packets are rerouted to the appropriate IP address inside your network by a device providing translation services. In this way - IP addresses of machines on your internal network are
overt channel
Client
Network Address Translation (NAT)
ISO 17799
28. Ping Scan
Back orifice
-sP
SYN attack
Ethernet
29. 18 U.S.C. 1029
Digital Signature
Electronic Code Book (ECB)
open source
Possession of access devices
30. A comparison metric for different biometric devices and technologies; the point at which the false acceptance rate (FAR) equals the
-sX
Crossover Error Rate (CER)
-PB
network operations center (NOC)
31. One or more locations from which control is exercised over a computer - television broadcast - or telecommunications network.
port scanning
network operations center (NOC)
intrusion detection system (IDS)
logic bomb
32. The process of attaching a particular protocol header and trailer to a unit of data before transmission on the network. Occurs at layer 2 of the OSI reference model.
Echo request
private key
encapsulation
Fraud and related activity in connection with computers
33. A string used for authentication in SNMP. The public community string is used for read-only searches - whereas the private community string is used for read/write. Community strings are transmitted in clear text in SNMPv1. SNMPv3 provides encryption
network interface card (NIC)
firewall
A R
Community String
34. An attack where the hacker manipulates parameters within the URL string in hopes of modifying data.
parameter tampering
Simple Network Management Protocol (SNMP)
Bluesnarfing
File Transfer Protocol (FTP)
35. Attacks on the actual programming code of an application.
Application-Level Attacks
Hypertext Transfer Protocol Secure (HTTPS)
Point-to-Point Protocol (PPP)
Point-to-Point Tunneling Protocol (PPTP)
36. Actions - devices - procedures - techniques - or other measures intended to reduce the vulnerability of an information system.
Common Internet File System/Server Message Block
Crossover Error Rate (CER)
Point-to-Point Protocol (PPP)
Countermeasures
37. The subjective - potential percentage of loss to a specific asset if a specific threat is realized. The exposure factor (EF) is a subjective value the person assessing risk must define.
stateful packet filtering
File Allocation Table (FAT)
NT LAN Manager (NTLM)
Exposure Factor
38. TCP connect() scan
sidejacking
risk acceptance
-sT
Pretty Good Privacy (PGP)
39. A utility that sends an ICMP Echo message to determine if a specific IP address is accessible; if the message receives a reply - the address is reachable.
-oN
secure channel
gap analysis
Packet Internet Groper (ping)
40. An approach to restricting system access to authorized users in which roles are created for various job functions. The permissions to perform certain operations are assigned to specific roles. Members of staff (or other system users) are assigned par
Access Control List (ACL)
role-based access control
INFOSEC Assessment Methodology (IAM)
Mantrap
41. The software product or system that is the subject of an evaluation.
Trojan Horse
Target Of Engagement (TOE)
FreeBSD
smart card
42. A number assigned during TCP startup sessions that tracks how much information has been moved. This number is used by hackers when hijacking sessions.
initial sequence number (ISN)
reverse lookup; reverse DNS lookup
TACACS
Trojan Horse
43. A proprietary - open - wireless technology used for transferring data from fixed and mobile devices over short distances.
Electronic Code Book (ECB)
Bluetooth
MD5
service level agreements (SLAs)
44. Name given to expert groups that handle computer security incidents.
Hypertext Transfer Protocol (HTTP)
Computer Emergency Response Team (CERT)
intranet
port knocking
45. A value assigned to uniquely identify a single wide area network (WAN) in wireless LANs. SSIDs are broadcast by default - and are sent in the header of every packet. SSIDs provide no encryption or security.
Open System Interconnection (OSI) Reference Model
Service Set Identifier (SSID)
Ethical Hacker
-sF
46. The ability to trace actions performed on a system to a specific user or system entity.
Accountability
NetBSD
site survey
Cryptography
47. In penetration testing - enumeration is the act of querying a device or network segment thoroughly and systematically for information.
Simple Mail Transfer Protocol (SMTP)
Internet Protocol (IP)
integrity
enumeration
48. TCP Ping
Eavesdropping
rule-based access control
-PT
CNAME record
49. A software license agreement; a contract between the 'licensor' and purchaser establishing the right to use the software.
End User Licensing Agreement (EULA)
Antivirus (AV) software
polymorphic virus
intranet
50. An attack in which the hacker can derive information from the ciphertext without actually decoding it. Sensitive information can be considered compromised if an adversary can infer its real value with a high level of confidence.
gap analysis
intranet
inference attack
enumeration