SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. An attack that exploits the common mistake many people make when installing operating systems
operating system attack
fragmentation
-oG
quality of service (QoS)
2. Directing a protocol from one port to another.
router
port redirection
Man-in-the-middle attack
parallel scan & 300 sec timeout & 1.25 sec/probe
3. Version Detection Scan
scope creep
local area network (LAN)
Wired Equivalent Privacy (WEP)
-sV
4. 18 U.S.C. 1030
net use \[target ip]IPC$ '' /user:''
-PM
Fraud and related activity in connection with computers
Interior Gateway Protocol (IGP)
5. A programming principle whereby the last piece of data added to the stack is the first piece of data taken off.
Interior Gateway Protocol (IGP)
Last In First Out (LIFO)
Mantrap
Three-Way (TCP) Handshake
6. Originally an extension of PPP - this is a protocol for authentication used within wireless networks. Works with multiple authentication measures.
Extensible Authentication Protocol (EAP)
Data Link layer
-PP
Competitive Intelligence
7. The process of recording activity on a system for monitoring and later review.
Auditing
Cloning
Malicious code
-sU
8. The potential for damage to or loss of an IT asset
risk
GET
security breach or security incident
RPC-DCOM
9. Process of breaking a packet into smaller units when it is being transmitted over a network medium that's unable to support a transmission unit the original size of the packet.
replay attack
fragmentation
initial sequence number (ISN)
Level II assessment
10. Also known as a digital certificate - this is an electronic file used to verify a user's identity - providing non-repudiation throughout the system It is also a set of data that uniquely identifies an entity. Certificates contain the entity's public
Certificate
The automated process of proactively identifying vulnerabilities of computing systems present in a network
Digital Certificate
Level III assessment
11. The means by which a recipient of a message can ensure the identity of the sender and that neither party can deny having sent or received the message. The most common method is through digital certificates.
Block Cipher
non-repudiation
Wireless Local Area Network (WLAN)
Archive
12. A device that receives and sends data packets between two or more networks; the packet headers and a forwarding table provide the router with the information necessary for deciding which interface to use to forward packets.
International Organization for Standardization (ISO)
802.11
router
Minimum acceptable level of risk
13. An evaluation consisting of a document review - interviews - and demonstrations - as well as vulnerability scans and hands-on testing.
-PP
Post Office Protocol 3 (POP3)
separation of duties
Level II assessment
14. One or more locations from which control is exercised over a computer - television broadcast - or telecommunications network.
piggybacking
network operations center (NOC)
Exploit
Due Care
15. A protocol that uses a private key to encrypt data before transmitting confidential documents over the Internet; widely used on e-commerce - banking - and other sites requiring privacy.
Secure Sockets Layer (SSL)
reverse lookup; reverse DNS lookup
packet
-sA
16. A class of algorithms for cryptography that use the same cryptographic key for both decryption and encryption.
Reconnaissance - Scanning - Gaining Access - Maintaining Access - Covering Tracks
symmetric algorithm
rootkit
Covert Channel
17. A standard developed to enable routers to exchange messages containing information about routes to reach subnets in the network.
private network address
-p <port ranges>
Routing Protocol
Wireless Local Area Network (WLAN)
18. A denial-of-service technique that uses numerous hosts to perform the attack.
local area network (LAN)
Domain Name
Back orifice
Distributed DoS (DDoS)
19. Port Scanning
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
20. Nmap normal output
Google hacking
segment
Community String
-oN
21. An unknown deficiency in software or some other product that results in a security vulnerability being identified.
security defect
Man-in-the-middle attack
Routing Information Protocol (RIP)
-sU
22. Malicious code that uses a polymorphic engine to mutate while keeping the original algorithm intact; the code changes itself each time it runs - but the function of the code will not change.
POP 3
Institute of Electrical and Electronics Engineers (IEEE)
Distributed DoS (DDoS)
polymorphic virus
23. A simple PPP authentication mechanism in which the user name and password are transmitted in clear text to prove identity. PAP compares the user name and password to a table listing authorized users.
Password Authentication Protocol (PAP)
Trojan Horse
Information Technology (IT) infrastructure
POP 3
24. A type of DNS transfer - where all records from an SOA are transmitted to the requestor. Zone transfers have two options: full (opcode AXFR) and incremental (IXFR).
null session
Zone transfer
private key
Secure Sockets Layer (SSL)
25. RPC Scan
gray box testing
-sR
Due Diligence
Banner Grabbing
26. An organization's threshold for the seven areas of information security responsibility. This level is established based on the objectives for maintaining confidentiality - integrity - and availability of the organization's IT assets and infrastructur
-PP
Minimum acceptable level of risk
Extensible Authentication Protocol (EAP)
Cracker
27. A host designed to collect data on suspicious activity.
Denial of Service (DoS)
honeypot
risk assessment
Wireless Local Area Network (WLAN)
28. A virus written in a macro language and usually embedded in document or spreadsheet files.
Macro virus
Block Cipher
asynchronous transmission
Baseline
29. A symmetric key cryptographic algorithm that transforms a block of information at a time using a cryptographic key. For a block cipher algorithm - the length of the input block is the same as the length of the output block.
National Security Agency
Block Cipher
Real application encompassing Trojan
Methodology
30. A Canonical Name record within DNS - used to provide an alias for a domain name.
Interior Gateway Protocol (IGP)
CNAME record
Collision Domain
gray box testing
31. A file system used by the Mac OS.
R
integrity
replay attack
Hierarchical File System (HFS)
32. An international organization composed of national standards bodies from over 75 countries. Developed the OSI reference model.
Fraud and related activity in connection with computers
International Organization for Standardization (ISO)
Tunneling Virus
risk
33. Independent review and examination of records and activities to assess the adequacy of system controls - to ensure compliance with established policies and operational procedures - and to recommend necessary changes.
footprinting
routed protocol
Anonymizer
audit
34. A form of fraud in which someone pretends to be someone else by assuming that person's identity - typically in order to access resources or obtain credit and other benefits in that person's name.
Data Encryption Standard (DES)
identity theft
HTTP tunneling
Routing Information Protocol (RIP)
35. A network traffic management technique designed to allow applications to specify the route a packet will take to a destination - regardless of what the route tables between the two systems say.
self encrypting
source routing
-PS
Request for Comments (RFC)
36. Provides router-to-router or host-to-network connections over asynchronous and synchronous circuits.
Antivirus (AV) software
Point-to-Point Protocol (PPP)
spam
public key
37. An evaluation conducted to determine the potential for damage to or loss of an IT asset.
risk assessment
--randomize_hosts -O OS fingerprinting
routed protocol
EDGAR database
38. Network Scanning
HTTP tunneling
TACACS
A procedure for identifying active hosts on a network.
rootkit
39. SYN Ping
risk avoidance
route
Vulnerability Assessment
-PS
40. Shifting responsibility from one party to another
Pretty Good Privacy (PGP)
Information Technology (IT) asset criticality
DNS enumeration
risk transference
41. A background process found in Unix - Linux - Solaris - and other Unix-based operating systems.
forwarding
TACACS
Daemon
proxy server
42. An attack with the goal of preventing authorized users from accessing services and preventing the normal operation of computers and networks.
Due Care
Denial of Service (DoS)
Trusted Computer Base (TCB)
Pretty Good Privacy (PGP)
43. A device set up to send a response on behalf of an end node to the requesting host. Proxies are generally used to obfuscate the host from the Internet.
Authentication - Authorization - and Accounting (AAA)
sniffer
proxy server
Wireless Local Area Network (WLAN)
44. A wireless LAN device that acts as a central point for all wireless traffic. The AP is connected to both the wireless LAN and the wired LAN - providing wireless clients access to network resources.
Service Set Identifier (SSID)
intrusion detection system (IDS)
Access Point (AP)
Due Care
45. A software or hardware application or device that captures user keystrokes.
Sign in Seal
Internet Protocol (IP)
FTP
keylogger
46. An early network application that provides information on users currently logged on to a machine.
Finger
red team
Black Box Testing
Digital Watermarking
47. Management policy and procedures designed to maintain or restore business operations - including computer operations - possibly at an alternate location - in the event of emergencies - system failures - or disaster.
NetBSD
Contingency Plan
Service Set Identifier (SSID)
Community String
48. A protocol that allows a client computer to request services from a server and the server to return the results.
remote procedure call (RPC)
Crossover Error Rate (CER)
INFOSEC Assessment Methodology (IAM)
Level II assessment
49. LAN standard - defined by ANSI X3T9.5 - specifying a 100Mbps token-passing network using fiber-optic cable and a dualring architecture for redundancy - with transmission distances of up to two kilometers.
Fiber Distributed Data Interface (FDDI)
Syslog
Information Technology (IT) security architecture and framework
gray box testing
50. The secret portion of an asymmetric key pair typically used to decrypt or digitally sign data. The private key is never shared and is always used for decryption - with one notable exception: The private key is used to encrypt the digital signature.
File Allocation Table (FAT)
-sW
private key
XOR Operation