SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A text file stored within a browser by a web server that maintains information about the connection. Cookies are used to store information to maintain a unique but consistent surfing experience - but can also contain authentication parameters. Cookie
Pretty Good Privacy (PGP)
FTP
proxy server
Cookie
2. A Windows-based GUI version of nmap.
Fraud and related activity in connection with computers
out-of-band signaling
parallel scan
Zenmap
3. Sending unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobile phones - PDAs - or laptop computers.
Biometrics
gap analysis
Bluejacking
Zenmap
4. A security tool designed to protect a system or network against attacks by comparing traffic patterns against a list of both known attack signatures and general characteristics of how attacks may be carried out. Threats are rated and reported.
intrusion detection system (IDS)
net use \[target ip]IPC$ '' /user:''
File Allocation Table (FAT)
Demilitarized Zone (DMZ)
5. A symmetric key cryptographic algorithm that transforms a block of information at a time using a cryptographic key. For a block cipher algorithm - the length of the input block is the same as the length of the output block.
MAC filtering
War Dialing
Lightweight Directory Access Protocol (LDAP)
Block Cipher
6. A proprietary - open - wireless technology used for transferring data from fixed and mobile devices over short distances.
Algorithm
File Transfer Protocol (FTP)
Bluetooth
net use \[target ip]IPC$ '' /user:''
7. The central part of a computer or communications system hardware firmware - and software that implements the basic security procedures for controlling access to system resources.
security kernel
FreeBSD
-sF
Cracker
8. Microsoft SID 500
Wi-Fi
Local Administrator
Point-to-Point Protocol (PPP)
steganography
9. Hex 29
-PP
U P F
Timestamping
passive attack
10. The act of using numerous electronic serial numbers on a cell phone until a valid number is located.
National Security Agency
encryption
False Acceptance Rate (FAR)
Tumbling
11. An announcement - typically from a software vendor - of a known security vulnerability in a program; often the bulletin contains instructions for the application of a software patch.
phishing
risk
-PS
security bulletins
12. An evaluation consisting of a document review - interviews - and demonstrations - as well as vulnerability scans and hands-on testing.
inference attack
Level II assessment
Archive
Defines legal email marketing
13. Start of Authority record. This record identifies the primary name server for the zone. The SOA record contains the host name of the server responsible for all DNS records within the namespace - as well as the basic properties of the domain.
SOA record
Echo request
Banner Grabbing
Data Encryption Standard (DES)
14. Formal description and evaluation of the vulnerabilities in an information system
Black Box Testing
Vulnerability Assessment
A S
-PM
15. The monetary value assigned to an IT asset.
remote access
parallel scan & 300 sec timeout & 1.25 sec/probe
ad hoc mode
Information Technology (IT) asset valuation
16. A non-self-replicating program that appears to have a useful purpose - but in reality has a different - malicious purpose.
Cryptographic Key
Trojan Horse
Covert Channel
-sS
17. White hat
Collision Domain
spam
Hacks with permission
Ethical Hacker
18. Occurs when authorized users accumulate excess privileges on a system due to moving from position to position.
Access Creep
Fast Ethernet
Assessment
FreeBSD
19. A secret - typically consisting of only decimal digits - that a claimant memorizes and uses to authenticate his identity
Audit Trail
personal identification number (PIN)
Bit Flipping
Computer-Based Attack
20. Malware designed to install some sort of virus - backdoor - and so on - on a target system.
Address Resolution Protocol (ARP)
ECHO reply
Droppers
overt channel
21. Idlescan
separation of duties
Authentication - Authorization - and Accounting (AAA)
honeypot
-sI
22. A group of penetration testers that assess the security of an organization - which is often unaware of the existence of the team or the exact assignment.
Trusted Computer Base (TCB)
red team
stream cipher
false negative
23. Looking over an authorized user's shoulder in order to steal information (such as authentication information).
HTTP
Secure Multipurpose Mail Extension (S/MIME)
Service Set Identifier (SSID)
shoulder surfing
24. A term trademarked by the Wi-Fi Alliance - used to define a standard for devices to use to connect to a wireless network.
-b
private network address
Wi-Fi
Vulnerability Scanning
25. A number assigned during TCP startup sessions that tracks how much information has been moved. This number is used by hackers when hijacking sessions.
ring topology
Zone transfer
initial sequence number (ISN)
Electronic Code Book (ECB)
26. Computer software or hardware that can intercept and log traffic passing over a digital network.
Hypertext Transfer Protocol (HTTP)
sniffer
Methodology
segment
27. A network architecture framework developed by ISO that describes the communications process between two systems across the Internet in seven distinct layers.
Digital Watermarking
rogue access point
Open System Interconnection (OSI) Reference Model
Computer Emergency Response Team (CERT)
28. A utility that traces a packet from your computer to an Internet host - showing how many hops the packet takes to reach the host and how long the packet requires to complete the hop.
Traceroute
Zombie
Event
Threat
29. The process of attaching a particular protocol header and trailer to a unit of data before transmission on the network. Occurs at layer 2 of the OSI reference model.
network interface card (NIC)
encapsulation
Biometrics
Banner Grabbing
30. A wireless LAN security standard developed by IEEE. Requires Temporal Key Integrity Protocol (TKIP) and Advanced Encryption Standard (AES).
Covert Channel
802.11 i
smart card
steganography
31. The set of all hardware - firmware - and/or software components critical to IT security. Bugs or vulnerabilities occurring inside the TCB might jeopardize the security properties of the entire system.
Trusted Computer Base (TCB)
-PS
security bulletins
Console Port
32. In computer security - this is an algorithm that uses separate keys for encryption and decryption.
Lightweight Directory Access Protocol (LDAP)
inference attack
HTTP
Asymmetric Algorithm
33. A well-known and studied phenomenon of human nature - whereby a single trait influences the perception of other traits.
halo effect
Worm
sheepdip
Cracker
34. A hacking method for stealing the cookies used during a session build and replaying them for unauthorized connection purposes.
Kerberos
smart card
Warm Site
sidejacking
35. Weakness in an information system - system security procedures - internal controls - or implementation that could be exploited or triggered by a threat source.
node
proxy server
Digital Watermarking
Vulnerability
36. The conveying of official access or legal power to a person or entity.
Authorization
Accountability
Antivirus (AV) software
risk transference
37. A set of rules defined by a system administrator that indicates whether access is allowed or denied to resource objects.
rule-based access control
NetBus
User Datagram Protocol (UDP)
Sign in Seal
38. A limited-function version of the Internetworking Operating System (IOS) - held in read-only memory in some earlier models of Cisco devices - capable of performing several seldom-needed low-level functions such as loading a new IOS into Flash memory
halo effect
Wired Equivalent Privacy (WEP)
piggybacking
RxBoot
39. A section or subset of the network. Often a router or other routing device provides the end point of the segment.
segment
signature scanning
Self Replicating
Level III assessment
40. Insane scan timing
parallel scan & 75 sec timeout & 0.3 sec/probe
Zero Subnet
protocol
network access server
41. The secret portion of an asymmetric key pair typically used to decrypt or digitally sign data. The private key is never shared and is always used for decryption - with one notable exception: The private key is used to encrypt the digital signature.
Internal access to the network
integrity
private key
Audit Trail
42. An evaluation consisting of a document review - interviews - and demonstrations. No hands-on testing is performed.
Blowfish
router
security breach or security incident
Level I assessment
43. Port Scanning
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
44. An unknown deficiency in software or some other product that results in a security vulnerability being identified.
Corrective Controls
Application Layer
security defect
security bulletins
45. A virus written in a macro language and usually embedded in document or spreadsheet files.
Macro virus
Local Administrator
Real application encompassing Trojan
spyware
46. A piece of software - provided by the vendor - intended to update or fix known - discovered problems in a computer program or its supporting data.
patch
-PM
Secure Sockets Layer (SSL)
Assessment
47. A mode of operation for a block cipher - with the characteristic that each possible block of plaintext has a defined corresponding ciphertext value - and vice versa
Electronic Code Book (ECB)
Information Technology (IT) asset criticality
risk
Event
48. An Application layer protocol for sending electronic mail between servers.
Simple Mail Transfer Protocol (SMTP)
Trusted Computer System Evaluation Criteria (TCSEC)
parallel scan & 75 sec timeout & 0.3 sec/probe
SMB
49. Nmap ml output
MD5
single loss expectancy (SLE)
-oX
symmetric encryption
50. Window Scan
Third Party
Copyright
Blowfish
-sW
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests