SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A card with a built-in microprocessor and memory used for identification or financial transactions. The card transfers data to and from a central computer when inserted into a reader.
Man-in-the-middle attack
null session
smart card
-PP
2. Hashing algorithm that results in a 128-bit output.
MD5
false rejection rate (FRR)
security defect
The automated process of proactively identifying vulnerabilities of computing systems present in a network
3. Nmap normal output
Wi-Fi Protected Access (WPA)
-oN
Hypertext Transfer Protocol Secure (HTTPS)
War Dialing
4. ICMP Type/Code 11
Fast Ethernet
Threat
passive attack
Time exceeded
5. Content Addressable Memory table. Holds all the MAC-address-to-port mappings on a switch.
-sA
CAM table
halo effect
Echo request
6. Name given to expert groups that handle computer security incidents.
Address Resolution Protocol (ARP)
Computer Emergency Response Team (CERT)
Algorithm
Hacks with permission
7. 1. The path a packet travels to reach the intended destination. Each individual device along the path traveled is called a hop. 2. Information contained on a device containing instructions for reaching other nodes on the network. This information can
Mantrap
route
pattern matching
parallel scan
8. Layer 6 of the OSI reference model. The Presentation layer ensures information sent by the Application layer of the sending system will be readable by the Application layer of the receiving system.
Filter
proxy server
Presentation layer
local area network (LAN)
9. A document describing information security guidelines - policies - procedures - and standards.
Computer-Based Attack
Information Technology (IT) security architecture and framework
Zero Subnet
segment
10. A measurable - physical characteristic used to recognize the identity - or verify the claimed identity - of an applicant. Facial images - fingerprints - and handwriting samples are all examples of biometrics.
Biometrics
Timestamping
SNMP
separation of duties
11. Devices - connected to one or more switches - grouped logically into a single broadcast domain. VLANs enable administrators to divide the devices connected to the switches into multiple VLANs without requiring separate physical switches.
Virtual Local Area Network (VLAN)
CAM table
Uniform Resource Locator (URL)
asynchronous transmission
12. Safeguards or countermeasures to avoid - counteract - or minimize security risks.
Bug
hash
security controls
hardware keystroke logger
13. The lack of clocking (imposed time ordering) on a bit stream.
SID
Rijndael
Authentication - Authorization - and Accounting (AAA)
Asynchronous
14. Sending unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobile phones - PDAs - or laptop computers.
Videocipher II Satellite Encryption System
No previous knowledge of the network
Bluejacking
Tini
15. Any network incident that prompts some kind of log entry or other notification.
Domain Name System (DNS)
Copyright
Event
Last In First Out (LIFO)
16. Hex 10
security by obscurity
Domain Name System (DNS) cache poisoning
A
War Dialing
17. A partially protected zone on a network - not exposed to the full fury of the Internet - but not fully behind the firewall. This technique is typically used on parts of the network that must remain open to the public (such as a web server) but must a
Demilitarized Zone (DMZ)
Block Cipher
Cold Site
SYN attack
18. A backup facility with the electrical and physical components of a computer facility - but with no computer equipment in place. The site is ready to receive the necessary replacement computer equipment in the event the user has to move from his main
serialize scans & 15 sec wait
Interior Gateway Protocol (IGP)
Cold Site
-sO
19. A biometric device that uses pattern-recognition techniques based on images of the irises of an individual's eyes.
-sP
iris scanner
hybrid attack
Auditing
20. A collection of historical records or the place where they are kept. In computing - an archive generally refers to backup copies of logs and/or data.
Daemon
Archive
Fast Ethernet
session splicing
21. A set of exclusive rights granted by the law of a jurisdiction to the author or creator of an original work - including the right to copy - distribute - and adapt the work.
Copyright
Wireless Local Area Network (WLAN)
sidejacking
Local Administrator
22. Originally an extension of PPP - this is a protocol for authentication used within wireless networks. Works with multiple authentication measures.
John the Ripper - LOphtcrack - Ophtcrack - Cain and Abel
Extensible Authentication Protocol (EAP)
War Dialing
Fiber Distributed Data Interface (FDDI)
23. Malware designed to install some sort of virus - backdoor - and so on - on a target system.
No previous knowledge of the network
Database
Droppers
Electronic Code Book (ECB)
24. An attack that is direct in nature - usually where the attacker injects something into - or otherwise alters - the network or system target.
Finding a directory listing and gaining access to a parent or root file for access to other files
Zero Subnet
Active Attack
security defect
25. Controls to detect anomalies or undesirable events occurring on a system.
Destination Unreachable
John the Ripper - LOphtcrack - Ophtcrack - Cain and Abel
net use \[target ip]IPC$ '' /user:''
Detective Controls
26. Two or more LANs connected by a high-speed line across a large geographical area.
-sX
Wide Area Network (WAN)
Cache
parameter tampering
27. Software that has advertisements embedded within. Generally displays ads in the form of pop-ups.
Adware
role-based access control
sheepdip
Backdoor
28. An international organization composed of national standards bodies from over 75 countries. Developed the OSI reference model.
risk transference
Worm
International Organization for Standardization (ISO)
CIA triangle
29. A storage buffer that transparently stores data so future requests for the same data can be served faster.
Cache
Certificate Authority (CA)
port scanning
RID Resource identifier
30. A self-replicating - self-propagating - self-contained program that uses networking mechanisms to spread itself.
Worm
Network Basic Input/Output System (NetBIOS)
fragmentation
Cryptography
31. A method in cryptography by which cryptographic keys are exchanged between users - allowing use of a cryptographic algorithm (for example - the Diffie-Hellman key exchange).
Bug
nslookup
Trusted Computer System Evaluation Criteria (TCSEC)
key exchange protocol
32. A device providing temporary - on-demand - point-to-point network access to users.
network access server
SSH
reverse social engineering
port scanning
33. Freely and readily available information on an organization that can be gathered by a business entity about its competitor's customers - products - and marketing - and can be used by an attacker to build useful information for further attacks.
Competitive Intelligence
War Dialing
Bluesnarfing
Mandatory access control (MAC)
34. An API that provides services related to the OSI model's Session layer - allowing applications on separate computers to communicate over a LAN.
sidejacking
Digital Watermarking
intranet
Network Basic Input/Output System (NetBIOS)
35. An unknown deficiency in software or some other product that results in a security vulnerability being identified.
Bluesnarfing
security defect
false negative
Interior Gateway Protocol (IGP)
36. A wireless LAN security standard developed by IEEE. Requires Temporal Key Integrity Protocol (TKIP) and Advanced Encryption Standard (AES).
Blowfish
limitation of liability and remedies
802.11 i
Demilitarized Zone (DMZ)
37. MAC Flooding
Asymmetric
footprinting
Overwhelm CAM table to convert switch to hub mode
Exploit
38. The cyclical practice of identifying - classifying - remediating - and mitigating vulnerabilities.
XOR Operation
Malware
Corrective Controls
Vulnerability Management
39. An attacker who breaks into computer systems with malicious intent - without the owner's knowledge or permission.
-PP
hardware keystroke logger
Black Hat
Hierarchical File System (HFS)
40. The process of using easily accessible DNS records to map a target network's internal hosts.
R
DNS enumeration
Audit Trail
Discretionary Access Control (DAC)
41. The exploitation of a security vulnerability
false negative
security breach or security incident
intranet
Network Basic Input/Output System (NetBIOS)
42. A network deployed as a trap to detect - deflect - or deter unauthorized use of information systems.
honeynet
rule-based access control
out-of-band signaling
Boot Sector Virus
43. A program designed to browse websites in an automated - methodical manner. Sometimes these programs are used to harvest information from websites - such as e-mail addresses.
Web Spider
nslookup
sniffer
Service Set Identifier (SSID)
44. Formerly Redundant Array of Inexpensive Disks; a technology that provides increased storage functions and reliability through redundancy. This is achieved by combining multiple disk drive components into a logical unit - where data is distributed acr
Tunneling Virus
MAC filtering
Zenmap
Redundant Array of Independent Disks (RAID)
45. The process of systematically testing each port on a firewall to map rules and determine accessible ports.
firewalking
File Transfer Protocol (FTP)
Corrective Controls
Biometrics
46. A type 0 ICMP message used to reply to ECHO requests. Used with ping to verify network layer connectivity between hosts.
routed protocol
Virtual Local Area Network (VLAN)
stateful packet filtering
ECHO reply
47. A method of permitting only MAC addresses in a preapproved list network access. Addresses not matching are blocked.
security bulletins
Defines legal email marketing
MAC filtering
Threat
48. Port Scanning
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
49. An organization composed of engineers - scientists - and students who issue standards related to electrical - electronic - and computer engineering.
-P0
Institute of Electrical and Electronics Engineers (IEEE)
suicide hacker
Copyright
50. Any kind of connection that allows you to see all traffic passing by. Generally used in reference to a NIDS (network-based IDS) to monitor all traffic.
Warm Site
HTTP tunneling
network tap
Replacing numbers in a url to access other files
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests