SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. An evaluation conducted to determine the potential for damage to or loss of an IT asset.
A series of messages sent by someone attempting to break into a computer to learn about the computer's network services.
SOA record
risk
risk assessment
2. Computer software or hardware that can intercept and log traffic passing over a digital network.
sniffer
rogue access point
SNMP
gray box testing
3. A point-to-point connection between two endpoints created to exchangedata. Typically a tunnel is either an encrypted connection - or a connection using a protocol in a method for which it was not designed. An encrypted connection forms a point-to-poi
Tunnel
limitation of liability and remedies
public key infrastructure (PKI)
HTTP
4. A nonnumerical - subjective risk evaluation. Used with qualitative assessment (an evaluation of risk that results in ratings of none - low - medium - and high for the probability.)
Brute-Force Password Attack
qualitative analysis
Reconnaissance - Scanning - Gaining Access - Maintaining Access - Covering Tracks
script kiddie
5. A symmetric key cryptographic algorithm that transforms a block of information at a time using a cryptographic key. For a block cipher algorithm - the length of the input block is the same as the length of the output block.
Directory Traversal
Block Cipher
port knocking
Internet Assigned Number Authority (IANA)
6. An anonymous connection to an administrative share (IPC$) on a Windows machine. Null sessions allow for enumeration of Windows machines - among other attacks.
Wi-Fi
-PB
Time exceeded
null session
7. A unique numerical string - created by a hashing algorithm on a given piece of data - used to verify data integrity. Generally hashes are used to verify the integrity of files after download (comparison to the hash value on the site before download)
hash
Destination Unreachable
TACACS
Archive
8. The cyclical practice of identifying - classifying - remediating - and mitigating vulnerabilities.
Black Hat
identity theft
Bluetooth
Vulnerability Management
9. Hex 12
Telnet
RxBoot
A S
Network Address Translation (NAT)
10. Hex 04
iris scanner
Access Point (AP)
R
Computer-Based Attack
11. In a classful IPv4 subnet - this is the network number with all binary 0s in the subnet part of the number. When written in decimal - the zero subnet has the same number as the classful network number.
HIDS
Multipartite virus
physical security
Zero Subnet
12. A routing protocol developed to be used within a single organization.
International Organization for Standardization (ISO)
Interior Gateway Protocol (IGP)
Reconnaissance - Scanning - Gaining Access - Maintaining Access - Covering Tracks
Domain Name System (DNS) cache poisoning
13. The basis of this kind of security is that an individual user - or program operating on the user's behalf - is allowed to specify explicitly the types of access other users (or programs executing on their behalf) may have to information under the use
polymorphic virus
packet
Real application encompassing Trojan
Discretionary Access Control (DAC)
14. The act of checking some sequence of tokens for the presence of the constituents of some pattern.
Ciphertext
pattern matching
Syslog
Bit Flipping
15. A cryptographic attack where bits are manipulated in the ciphertext itself to generate a predictable outcome in the plaintext once it is decrypted.
-oG
encryption
Buffer Overflow
Bit Flipping
16. A point of reference used to mark an initial state in order to manage change.
Baseline
Audit Data
Digital Signature
Internet Protocol Security (IPSec) architecture
17. Transmission using channels or frequencies outside those normally used for data transfer; often used for error reporting.
Self Replicating
Hypertext Transfer Protocol Secure (HTTPS)
out-of-band signaling
Common Internet File System/Server Message Block
18. A symmetric - block-cipher data-encryption standard that uses a variablelength key that can range from 32 bits to 448 bits.
Blowfish
-sF
risk
No previous knowledge of the network
19. A software or hardware defect that often results in system vulnerabilities.
gray hat
Block Cipher
Port Address Translation (PAT)
Bug
20. Also known as a digital certificate - this is an electronic file used to verify a user's identity - providing non-repudiation throughout the system It is also a set of data that uniquely identifies an entity. Certificates contain the entity's public
Certificate
Virtual Private Network (VPN)
phishing
The automated process of proactively identifying vulnerabilities of computing systems present in a network
21. A decision to reduce the potential for damage to or loss of an IT asset by taking some type of action
Community String
risk avoidance
non-repudiation
hacktivism
22. A derogatory term used to describe an attacker - usually new to the field - who uses simple - easy-to-follow scripts or programs developed by others to attack computer systems and networks and deface websites.
U P F
-sT
Mantrap
script kiddie
23. Controls to detect anomalies or undesirable events occurring on a system.
Detective Controls
Denial of Service (DoS)
R
Bastion host
24. A method of permitting only MAC addresses in a preapproved list network access. Addresses not matching are blocked.
White Box Testing
MAC filtering
Collision
rule-based access control
25. A social-engineering attack using computer resources - such as e-mail or IRC.
Electronic Code Book (ECB)
Level I assessment
Vulnerability Assessment
Computer-Based Attack
26. The central part of a computer or communications system hardware firmware - and software that implements the basic security procedures for controlling access to system resources.
Hacks without permission
encapsulation
Internet service provider (ISP)
security kernel
27. In regard to hash algorithms - this occurs when two or more distinct inputs produce the same output.
Echo request
Address Resolution Protocol (ARP) table
Collision
FreeBSD
28. A network system of servers that translates numeric Internet Protocol (IP) addresses into human-friendly - hierarchical Internet addresses - and vice versa.
Adware
Cold Site
segment
Domain Name System (DNS)
29. A communications protocol used for browsing the Internet.
secure channel
Hypertext Transfer Protocol (HTTP)
Denial of Service (DoS)
SYN flood attack
30. A program or piece of code inserted into a system - usually covertly - with the intent of compromising the confidentiality - integrity - or availability of the victim's data - applications - or operating system. Malware consists of viruses - worms -
Malware
port scanning
proxy server
ping sweep
31. A mode of operation for a block cipher - with the characteristic that each possible block of plaintext has a defined corresponding ciphertext value - and vice versa
Exposure Factor
Electronic Code Book (ECB)
802.11 i
quantitative risk assessment
32. Any item of value or worth to an organization - whether physical or virtual.
Asset
Zombie
R
local area network (LAN)
33. A background process found in Unix - Linux - Solaris - and other Unix-based operating systems.
Mandatory access control (MAC)
Smurf attack
Brute-Force Password Attack
Daemon
34. A standard for encrypting e-mail - web pages - and other stream-oriented information transmitted over the Internet.
Local Administrator
Transport Layer Security (TLS)
DNS enumeration
Pretty Good Privacy (PGP)
35. A security protocol for wireless local area networks defined in the 802.11b standard; intended to provide the same level of security as a wired LAN. WEP is not considered strong security - although it does authenticate clients to access points - encr
Syslog
Zero Subnet
node
Wired Equivalent Privacy (WEP)
36. 18 U.S.C. 1029
Possession of access devices
Internet Protocol (IP)
SNMP
port redirection
37. LAN standard - defined by ANSI X3T9.5 - specifying a 100Mbps token-passing network using fiber-optic cable and a dualring architecture for redundancy - with transmission distances of up to two kilometers.
reverse lookup; reverse DNS lookup
Authentication - Authorization - and Accounting (AAA)
Fiber Distributed Data Interface (FDDI)
Trapdoor Function
38. Any kind of connection that allows you to see all traffic passing by. Generally used in reference to a NIDS (network-based IDS) to monitor all traffic.
Auditing
network tap
NetBus
Asymmetric Algorithm
39. A technology where you advertise one IP address externally and data packets are rerouted to the appropriate IP address inside your network by a device providing translation services. In this way - IP addresses of machines on your internal network are
Tini
Network Address Translation (NAT)
Wrapper
intrusion detection system (IDS)
40. A comparison metric for different biometric devices and technologies; the point at which the false acceptance rate (FAR) equals the
security by obscurity
Crossover Error Rate (CER)
Smurf attack
Transmission Control Protocol (TCP)
41. A brand name of analog scrambling and de-scrambling equipment for cable and satellite television - invented primarily to keep consumer Television receive-only (TVRO) satellite equipment from receiving TV programming except on a subscription basis.
rogue access point
Packet Internet Groper (ping)
Asset
Videocipher II Satellite Encryption System
42. A social-engineering attack that manipulates the victim into calling the attacker for help.
reverse social engineering
National Security Agency
port scanning
non-repudiation
43. White box test
Reconnaissance - Scanning - Gaining Access - Maintaining Access - Covering Tracks
Electronic Code Book (ECB)
Internal access to the network
Local Administrator
44. A defined measure of service within a network system
-oX
quality of service (QoS)
Wiretapping
Data Link layer
45. A device that provides access between two or more networks. Gateways are typically used to connect dissimilar networks.
red team
John the Ripper - LOphtcrack - Ophtcrack - Cain and Abel
gateway
spam
46. Port 80/81/8080
rogue access point
-sI
node
HTTP
47. A free and popular version of the Unix operating system.
Unicode
FreeBSD
ECHO reply
-sR
48. A group of people - gathered together by a business entity - working to address a specific problem or goal.
Wiretapping
Tiger Team
private key
scope creep
49. Provides router-to-router or host-to-network connections over asynchronous and synchronous circuits.
Point-to-Point Protocol (PPP)
Data Encryption Standard (DES)
Replacing numbers in a url to access other files
War Dialing
50. ICMP Type/Code 0-0
Authentication
Access Point (AP)
Echo Reply
POP 3