SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A utility that traces a packet from your computer to an Internet host - showing how many hops the packet takes to reach the host and how long the packet requires to complete the hop.
Information Technology (IT) security architecture and framework
Multipurpose Internet Mail Extensions (MIME)
Traceroute
risk transference
2. Content Addressable Memory table. Holds all the MAC-address-to-port mappings on a switch.
CAM table
Distributed DoS (DDoS)
-sS
suicide hacker
3. Management policy and procedures designed to maintain or restore business operations - including computer operations - possibly at an alternate location - in the event of emergencies - system failures - or disaster.
false negative
Lightweight Directory Access Protocol (LDAP)
private network address
Contingency Plan
4. A security tool designed to protect a system or network against attacks by comparing traffic patterns against a list of both known attack signatures and general characteristics of how attacks may be carried out. Threats are rated and protective measu
Media Access Control (MAC)
Database
intrusion prevention system (IPS)
Acceptable Use Policy (AUP)
5. Software or firmware intended to perform an unauthorized process that will have an adverse impact on the confidentiality - integrity - or availability of an information system. A virus - worm - Trojan horse - or other code-based entity that infects a
Malicious code
port redirection
Three-Way (TCP) Handshake
Internet Control Message Protocol (ICMP)
6. A sublayer of layer 2 of the OSI model - the Data Link layer. It provides addressing and channel access control mechanisms that enable several terminals or network nodes to communicate within a multipoint network.
Media Access Control (MAC)
Virtual Local Area Network (VLAN)
Acknowledgment (ACK)
Domain Name System (DNS) cache poisoning
7. The Security Accounts Manager file in Windows stores all the password hashes for the system.
SAM
Mandatory access control (MAC)
promiscuous mode
Password Authentication Protocol (PAP)
8. Two or more LANs connected by a high-speed line across a large geographical area.
-P0
parallel scan & 300 sec timeout & 1.25 sec/probe
Wide Area Network (WAN)
Malicious code
9. RPC Scan
remote procedure call (RPC)
-sR
Level III assessment
passive attack
10. An announcement - typically from a software vendor - of a known security vulnerability in a program; often the bulletin contains instructions for the application of a software patch.
asynchronous transmission
Transmission Control Protocol (TCP)
integrity
security bulletins
11. A hacker who aims to bring down critical infrastructure for a 'cause' and does not worry about the penalties associated with his actions.
Multipurpose Internet Mail Extensions (MIME)
suicide hacker
personal identification number (PIN)
Access Creep
12. A situation in which an IDS or other sensor triggers on an event as an intrusion attempt - when it was actually legitimate traffic.
parallel scan & 300 sec timeout & 1.25 sec/probe
Internet Assigned Number Authority (IANA)
SYN flood attack
false negative
13. The monetary value assigned to an IT asset.
risk transference
Electronic Code Book (ECB)
SMB
Information Technology (IT) asset valuation
14. The software product or system that is the subject of an evaluation.
Minimum acceptable level of risk
Target Of Engagement (TOE)
Backdoor
Corrective Controls
15. A standard that provides best-practice recommendations on information security management for use by those responsible for initiating - implementing - or maintaining Information Security Management Systems (ISMS). Information security is defined with
Hierarchical File System (HFS)
reverse social engineering
fully qualified domain name (FQDN)
ISO 17799
16. Establish Null Session
net use \[target ip]IPC$ '' /user:''
Trusted Computer System Evaluation Criteria (TCSEC)
CIA triangle
HIDS
17. An early network application that provides information on users currently logged on to a machine.
Extensible Authentication Protocol (EAP)
Cryptographic Key
flood
Finger
18. An unknown deficiency in software or some other product that results in a security vulnerability being identified.
Boot Sector Virus
security defect
Tunneling
port knocking
19. An informed decision to accept the potential for damage to or loss of an IT asset.
Access Creep
risk acceptance
Application-Level Attacks
separation of duties
20. The public portion of an asymmetric key pair typically used to encrypt data or verify signatures. Public keys are shared and are used to encrypt messages.
ISO 17799
piggybacking
identity theft
public key
21. Wireless LAN standards created by IEEE. 802.11a runs at up to 54Mbps at 5GHz - 802.11b runs at 11Mbps at 2.4GHz - 802.11g runs at 54Mbps at 2.4GHz - and 802.11n can run upwards of 150MBps.
False Acceptance Rate (FAR)
Algorithm
risk assessment
802.11
22. A point of reference used to mark an initial state in order to manage change.
Bluetooth
Possession of access devices
Baseline
steganography
23. A protocol defining packets that are able to be routed by a router.
firewall
Cloning
routed protocol
Daisy Chaining
24. Attacks on the actual programming code of an application.
Virtual Local Area Network (VLAN)
Internet Assigned Number Authority (IANA)
impersonation
Application-Level Attacks
25. Formerly Redundant Array of Inexpensive Disks; a technology that provides increased storage functions and reliability through redundancy. This is achieved by combining multiple disk drive components into a logical unit - where data is distributed acr
fragmentation
Redundant Array of Independent Disks (RAID)
-sL
Telnet
26. A record showing which user has accessed a given resource and what operations the user performed during a given period.
Audit Trail
Simple Network Management Protocol (SNMP)
Anonymizer
Acknowledgment (ACK)
27. MAC Flooding
ring topology
Lightweight Directory Access Protocol (LDAP)
Overwhelm CAM table to convert switch to hub mode
Acknowledgment (ACK)
28. A secret - typically consisting of only decimal digits - that a claimant memorizes and uses to authenticate his identity
personal identification number (PIN)
Real application encompassing Trojan
Contingency Plan
quantitative risk assessment
29. A networking configuration where all nodes are connected in a circle with no terminated ends on the cable.
802.11 i
Wireless Local Area Network (WLAN)
ring topology
A S
30. A symmetric - block-cipher data-encryption standard that uses a variablelength key that can range from 32 bits to 448 bits.
Blowfish
HTTP tunneling
proxy server
Hypertext Transfer Protocol Secure (HTTPS)
31. The act of checking some sequence of tokens for the presence of the constituents of some pattern.
pattern matching
gray hat
Hypertext Transfer Protocol (HTTP)
A series of messages sent by someone attempting to break into a computer to learn about the computer's network services.
32. An Ethernet networking system transmitting data at 100 million bits per second (Mbps) - 10 times the speed of an earlier Ethernet standard. Derived from the Ethernet 802.3 standard - it is also known as 100BaseT.
Network Address Translation (NAT)
Fast Ethernet
Common Internet File System/Server Message Block
Audit Trail
33. A domain composed of all the systems sharing any given physical transport media. Systems within a collision domain may collide with each other during the transmission of data. Collisions can be managed by CSMA/CD (collision detection) or CSMA/CA (col
Collision Domain
Vulnerability Management
Availability
Password Authentication Protocol (PAP)
34. Devices - connected to one or more switches - grouped logically into a single broadcast domain. VLANs enable administrators to divide the devices connected to the switches into multiple VLANs without requiring separate physical switches.
Competitive Intelligence
security by obscurity
Virtual Local Area Network (VLAN)
Buffer
35. NSA
A S
Real application encompassing Trojan
Finger
National Security Agency
36. Drawing symbols in public places to alert others to an open Wi-Fi network. War chalking can include the SSIDs - administrative passwords to APs - and other information.
War Chalking
Active Directory (AD)
Secure Multipurpose Mail Extension (S/MIME)
-oX
37. A documented process for a procedure designed to be consistent - repeatable - and accountable.
Request for Comments (RFC)
-b
Methodology
Ethical Hacker
38. Part of a service contract where the level of service is formally defined; may be required as part of the initial pen test agreements.
service level agreements (SLAs)
-sX
public key infrastructure (PKI)
Console Port
39. An industry standard protocol used for accessing and managing information within a directory service; an application protocol for querying and modifying data using directory services running over TCP/IP.
Lightweight Directory Access Protocol (LDAP)
parameter tampering
MAC filtering
Exploit
40. A symmetric key cipher where plaintext bits are combined with a pseudo-random cipher bit stream (keystream) - typically by an exclusive-or (XOR) operation. In a stream cipher the plaintext digits are encrypted one at a time - and the transformation o
GET
Trusted Computer System Evaluation Criteria (TCSEC)
stream cipher
Hypertext Transfer Protocol Secure (HTTPS)
41. A wireless access point that has either been installed on a secure company network without explicit authorization from a local network administrator - or has been created to allow a hacker to conduct a man-in-the-middle attack.
Domain Name System (DNS) cache poisoning
signature scanning
rogue access point
personal identification number (PIN)
42. A cryptographic attack where bits are manipulated in the ciphertext itself to generate a predictable outcome in the plaintext once it is decrypted.
CNAME record
spoofing
Bit Flipping
social engineering
43. Port 31337
private network address
Fiber Distributed Data Interface (FDDI)
port knocking
Back orifice
44. The contents of a packet. A system attack requires the attacker to deliver a malicious payload that is acted upon and executed by the system.
security by obscurity
Destination Unreachable
payload
non-repudiation
45. Set of tools (applications or code) that enables administrator-level accessto a computer or computer network and is designed to obscure the fact that the system has been compromised. Rootkits are dangerous malware entities that provide administrator
Macro virus
Finger
Hacks without permission
rootkit
46. Provides router-to-router or host-to-network connections over asynchronous and synchronous circuits.
Information Technology (IT) asset valuation
Point-to-Point Protocol (PPP)
Lightweight Directory Access Protocol (LDAP)
MD5
47. Used for exchanging structured information - such as XML-based messages - in the implementation of web services
remote access
Media Access Control (MAC)
-sV
Simple Object Access Protocol (SOAP)
48. Port Scanning
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
49. In a classful IPv4 subnet - this is the network number with all binary 0s in the subnet part of the number. When written in decimal - the zero subnet has the same number as the classful network number.
Uniform Resource Locator (URL)
rootkit
Zero Subnet
Real application encompassing Trojan
50. A NAT method in which multiple internal hosts - using private IP addressing - can be mapped through a single public IP address using the session IDs and port numbers. An internal global IP address can support in excess of 65 -000 concurrent TCP and U
non-repudiation
CNAME record
Port Address Translation (PAT)
source routing
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests