Test your basic knowledge |

CEH: Certified Ethical Hacker

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Directory Transversal






2. A computer virus that infects and spreads in multiple ways.






3. A device set up to send a response on behalf of an end node to the requesting host. Proxies are generally used to obfuscate the host from the Internet.






4. A denial-of-service technique that uses numerous hosts to perform the attack.






5. An Internet Protocol Security (IPSec) header used to verify that the contents of a packet have not been modified while the packet was in transit.






6. A protocol for exchanging packets over a serial line.






7. A method of network traffic filtering that monitors the entire communications process - including the originator of the session and from which direction it started.






8. Directing a protocol from one port to another.






9. Sending unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobile phones - PDAs - or laptop computers.






10. Idlescan






11. A fully operational off-site data-processing facility equipped with hardware and system software to be used in the event of a disaster.






12. A host designed to collect data on suspicious activity.






13. The exploitation of a security vulnerability






14. A record showing which user has accessed a given resource and what operations the user performed during a given period.






15. A wireless access point that has either been installed on a secure company network without explicit authorization from a local network administrator - or has been created to allow a hacker to conduct a man-in-the-middle attack.






16. A NAT method in which multiple internal hosts - using private IP addressing - can be mapped through a single public IP address using the session IDs and port numbers. An internal global IP address can support in excess of 65 -000 concurrent TCP and U






17. A mode of operation for a block cipher - with the characteristic that each possible block of plaintext has a defined corresponding ciphertext value - and vice versa






18. Controls internal to a system designed to resolve vulnerabilities and errors soon after they arise.






19. Port Scanning

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


20. Computer software or hardware that can intercept and log traffic passing over a digital network.






21. A firewall evasion technique whereby packets are wrapped in HTTP - as a covert channel to the target.






22. An extensible mechanism for e-mail. A variety of MIME types exist for sending content such as audio - binary - or video using the Simple Mail Transfer Protocol (SMTP).






23. A wireless LAN security standard developed by IEEE. Requires Temporal Key Integrity Protocol (TKIP) and Advanced Encryption Standard (AES).






24. nmap






25. A set of related communications protocols operating together as a group to address communication at some or all of the seven layers of the OSI reference model.






26. A trusted entity that issues and revokes public key certificates. In a network - a CA is a trusted entity that issues - manages - and revokes security credentials and public keys for message encryption and/or authentication. Within a public key infra






27. Port 389






28. Paranoid scan timing






29. A software or hardware application or device that captures user keystrokes.






30. Also known as the dot-dot-slash attack. Using directory traversal - the attacker attempts to access restricted directories and execute commands outside intended web server directories by using the URL to redirect to an unintended folder location.






31. The ability to trace actions performed on a system to a specific user or system entity.






32. A software program for remotely controlling a Microsoft Windows computer system over a network. Generally considered malware.






33. Polymorphic Virus






34. The art and science of creating a covert message or image within another message - image - audio - or video file.






35. Port 135






36. A principle in security engineering that attempts to use anonymity and secrecy (of design - implementation - and so on) to provide security; the footprint of the organization - entity - network - or system is kept as small as possible to avoid intere






37. An approach to restricting system access to authorized users in which roles are created for various job functions. The permissions to perform certain operations are assigned to specific roles. Members of staff (or other system users) are assigned par






38. don't ping






39. A virus written in a macro language and usually embedded in document or spreadsheet files.






40. Hex 14






41. Incremental Substitution






42. List Scan






43. An enumeration technique used to provide information about a computer system; generally used for operating system identification (also known as fingerprinting).






44. Formal description and evaluation of the vulnerabilities in an information system






45. An attack in which the hacker can derive information from the ciphertext without actually decoding it. Sensitive information can be considered compromised if an adversary can infer its real value with a high level of confidence.






46. Nmap ml output






47. A backlog of packets stored in buffers and waiting to be forwarded over an interface.






48. The software product or system that is the subject of an evaluation.






49. The use of deceptive computer-based means to trick individuals into disclosing sensitive personal information






50. Drawing symbols in public places to alert others to an open Wi-Fi network. War chalking can include the SSIDs - administrative passwords to APs - and other information.