SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A connectionless - layer 4 transport protocol. UDP is faster than TCP - but offers no reliability. A best effort is made to deliver the data - but no checks and verifications are performed to guarantee delivery. Therefore - UDP is termed a 'connectio
protocol stack
ping sweep
User Datagram Protocol (UDP)
Target Of Engagement (TOE)
2. Traffic-passing technique used by bridges and switches in which traffic received on an interface is sent out all interfaces on the device except the interface on which the information was originally received. Traffic on a switch is flooded when it is
flood
private key
Virtual Private Network (VPN)
ECHO reply
3. A term trademarked by the Wi-Fi Alliance - used to define a standard for devices to use to connect to a wireless network.
Distributed DoS (DDoS)
Wi-Fi
spoofing
Videocipher II Satellite Encryption System
4. 18 U.S.C. 1029
hashing algorithm
Assessment
Possession of access devices
-oN
5. A piece of code intentionally inserted into a software system that will perform a malicious function when specified conditions are met at some future point.
Cryptography
Electronic serial number
logic bomb
session splicing
6. A group of penetration testers that assess the security of an organization - which is often unaware of the existence of the team or the exact assignment.
red team
FreeBSD
halo effect
penetration testing
7. A security protocol for wireless local area networks defined in the 802.11b standard; intended to provide the same level of security as a wired LAN. WEP is not considered strong security - although it does authenticate clients to access points - encr
Computer Emergency Response Team (CERT)
Trapdoor Function
SOA record
Wired Equivalent Privacy (WEP)
8. A utility that sends an ICMP Echo message to determine if a specific IP address is accessible; if the message receives a reply - the address is reachable.
Packet Internet Groper (ping)
Level II assessment
-sO
Digital Watermarking
9. A routing protocol developed to be used within a single organization.
Interior Gateway Protocol (IGP)
reverse lookup; reverse DNS lookup
integrity
Internet Protocol Security (IPSec) architecture
10. Port 23
Request for Comments (RFC)
Mandatory access control (MAC)
Telnet
Administratively Prohibited
11. A derogatory term used to describe an attacker - usually new to the field - who uses simple - easy-to-follow scripts or programs developed by others to attack computer systems and networks and deface websites.
RID Resource identifier
script kiddie
-oG
source routing
12. A trusted entity that issues and revokes public key certificates. In a network - a CA is a trusted entity that issues - manages - and revokes security credentials and public keys for message encryption and/or authentication. Within a public key infra
Possession of access devices
router
Certificate Authority (CA)
Information Technology (IT) asset criticality
13. A standard that provides best-practice recommendations on information security management for use by those responsible for initiating - implementing - or maintaining Information Security Management Systems (ISMS). Information security is defined with
Address Resolution Protocol (ARP)
SMB
Droppers
ISO 17799
14. FIN Scan
-sF
Adware
Block Cipher
Traceroute
15. A class of algorithms for cryptography that use the same cryptographic key for both decryption and encryption.
nslookup
Authentication - Authorization - and Accounting (AAA)
symmetric algorithm
Fast Ethernet
16. Any circumstance or event with the potential to adversely impact organizationaloperations - organizational assets - or individuals through an information system via unauthorized access - destruction - disclosure - modification of information - and/or
Digital Certificate
Threat
Computer-Based Attack
Corrective Controls
17. A device that provides access between two or more networks. Gateways are typically used to connect dissimilar networks.
Contingency Plan
gateway
Interior Gateway Protocol (IGP)
Buffer
18. A string that represents the location of a web resource
Uniform Resource Locator (URL)
Level III assessment
Secure Multipurpose Mail Extension (S/MIME)
personal identification number (PIN)
19. A function that is easy to compute in one direction - yet believed to be difficult to compute in the opposite direction (finding its inverse) without special information - called the 'trapdoor.' Widely used in cryptography.
parallel scan
Trapdoor Function
Exploit
Algorithm
20. A computer process that requests a service from another computer and accepts the server's responses.
Client
MAC filtering
Cracker
Exposure Factor
21. A Canonical Name record within DNS - used to provide an alias for a domain name.
Defines legal email marketing
Telnet
CNAME record
Common Internet File System/Server Message Block
22. An announcement - typically from a software vendor - of a known security vulnerability in a program; often the bulletin contains instructions for the application of a software patch.
Minimum acceptable level of risk
Asynchronous
security bulletins
Rijndael
23. A list of IP addresses and corresponding MAC addresses stored on a local computer.
packet
Overwhelm CAM table to convert switch to hub mode
Address Resolution Protocol (ARP) table
Transmission Control Protocol (TCP)
24. Paranoid scan timing
Biometrics
serial scan & 300 sec wait
Application-Level Attacks
Boot Sector Virus
25. A backlog of packets stored in buffers and waiting to be forwarded over an interface.
queue
Google hacking
Baseline
Asymmetric Algorithm
26. Transmitting one protocol encapsulated inside another protocol.
Daisy Chaining
Tunneling
Acknowledgment (ACK)
source routing
27. A symmetric - block-cipher data-encryption standard that uses a variablelength key that can range from 32 bits to 448 bits.
FTP
Blowfish
serialize scans & 0.4 sec wait
stream cipher
28. A communications channel that is being used for a purpose it was not intended for - usually to transfer information secretly.
-sU
Covert Channel
Tumbling
Open System Interconnection (OSI) Reference Model
29. An industry standard protocol used for accessing and managing information within a directory service; an application protocol for querying and modifying data using directory services running over TCP/IP.
Electronic Code Book (ECB)
Black Hat
SSH
Lightweight Directory Access Protocol (LDAP)
30. A hacking method for stealing the cookies used during a session build and replaying them for unauthorized connection purposes.
Point-to-Point Protocol (PPP)
sidejacking
Challenge Handshake Authentication Protocol (CHAP)
heuristic scanning
31. A text file stored within a browser by a web server that maintains information about the connection. Cookies are used to store information to maintain a unique but consistent surfing experience - but can also contain authentication parameters. Cookie
source routing
Internet Protocol Security (IPSec) architecture
Cookie
Buffer
32. A pen testing method where the attacker knows all information about the internal network. It is designed to simulate an attack by a disgruntled systems administrator - or similar level.
Zero Subnet
Cookie
null session
White Box Testing
33. The process of attaching a particular protocol header and trailer to a unit of data before transmission on the network. Occurs at layer 2 of the OSI reference model.
Destination Unreachable
Cryptographic Key
encapsulation
Simple Mail Transfer Protocol (SMTP)
34. Port Scanning
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
35. An attack where the hacker manipulates parameters within the URL string in hopes of modifying data.
parameter tampering
Possession of access devices
-sX
nslookup
36. Port 22
SSH
Acknowledgment (ACK)
Packet Internet Groper (ping)
Open System Interconnection (OSI) Reference Model
37. Monitoring of telephone or Internet conversations - typically by covert means.
U P F
Wiretapping
Internet Protocol (IP)
Zero Subnet
38. A computer placed outside a firewall to provide public services to other Internet sites - and hardened to resist external attacks.
LDAP
--randomize_hosts -O OS fingerprinting
Bastion host
Vulnerability Scanning
39. Layer 2 of the OSI reference model. This layer provides reliable transit of data across a physical link. The Data Link layer is concerned with physical addressing - network topology - access to the network medium - error detection - sequential delive
ring topology
Demilitarized Zone (DMZ)
Access Creep
Data Link layer
40. The transmission of digital signals without precise clocking or synchronization.
Hacks with permission
-sF
CNAME record
asynchronous transmission
41. The act or actions of a hacker to put forward a cause or a political agenda - to affect some societal change - or to shed light on something he feels to be political injustice. These activities are usually illegal in nature.
phishing
Time Bomb
hacktivism
payload
42. The use of deceptive computer-based means to trick individuals into disclosing sensitive personal information
hardware keystroke logger
Exploit
inference attack
phishing
43. The central part of a computer or communications system hardware firmware - and software that implements the basic security procedures for controlling access to system resources.
spoofing
The automated process of proactively identifying vulnerabilities of computing systems present in a network
security kernel
Address Resolution Protocol (ARP) table
44. A card with a built-in microprocessor and memory used for identification or financial transactions. The card transfers data to and from a central computer when inserted into a reader.
risk transference
Electronic serial number
802.11
smart card
45. A network deployed as a trap to detect - deflect - or deter unauthorized use of information systems.
honeynet
Active Fingerprinting
private key
Unicode
46. Aggressive scan timing
parallel scan & 300 sec timeout & 1.25 sec/probe
Data Encryption Standard (DES)
polymorphic virus
Annualized Loss Expectancy (ALE)
47. An organization's threshold for the seven areas of information security responsibility. This level is established based on the objectives for maintaining confidentiality - integrity - and availability of the organization's IT assets and infrastructur
Exposure Factor
Minimum acceptable level of risk
End User Licensing Agreement (EULA)
security breach or security incident
48. A set of rules defined by a system administrator that indicates whether access is allowed or denied to resource objects.
Hypertext Transfer Protocol Secure (HTTPS)
rule-based access control
proxy server
-oA
49. A unit of information formatted according to specific protocols that allows precise transmittal of data from one network node to another. Also called a datagram or data packet - a packet contains a header (container) and a payload (contents). Any IP
NetBSD
Minimum acceptable level of risk
Hacks with permission
packet
50. Defined in RFC 826 - ARP is a protocol used to map a known IP address to a physical (MAC) address.
Level I assessment
Address Resolution Protocol (ARP)
-sX
Droppers