SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Attacks that take advantage of the built-in code and scripts most off-the-shelf applications come with.
shrink-wrap code attacks
suicide hacker
RPC-DCOM
Black Box Testing
2. The ability to trace actions performed on a system to a specific user or system entity.
Accountability
Due Care
fully qualified domain name (FQDN)
Block Cipher
3. Host-based IDS. An IDS that resides on the host - protecting against file and folder manipulation and other host-based attacks and actions.
security by obscurity
International Organization for Standardization (ISO)
session hijacking
HIDS
4. An application that monitors a computer or network to identify - and prevent - malware. AV is usually signature-based - and can take multiple actions on defined malware files/activity.
Active Directory (AD)
Overwhelm CAM table to convert switch to hub mode
SNMP
Antivirus (AV) software
5. Drawing symbols in public places to alert others to an open Wi-Fi network. War chalking can include the SSIDs - administrative passwords to APs - and other information.
Password Authentication Protocol (PAP)
POP 3
Network Basic Input/Output System (NetBIOS)
War Chalking
6. A penetration test in which the ethical hacker has limited knowledge of the intended target(s). Designed to simulate an internal - but non-systemadministrator-level attack.
gray box testing
ping sweep
Finding a directory listing and gaining access to a parent or root file for access to other files
Worm
7. A string used for authentication in SNMP. The public community string is used for read-only searches - whereas the private community string is used for read/write. Community strings are transmitted in clear text in SNMPv1. SNMPv3 provides encryption
INFOSEC Assessment Methodology (IAM)
audit
Community String
Electronic serial number
8. Defined in RFC 826 - ARP is a protocol used to map a known IP address to a physical (MAC) address.
Multipurpose Internet Mail Extensions (MIME)
sniffer
Cache
Address Resolution Protocol (ARP)
9. Port 31337
ring topology
Back orifice
Collision Domain
Exploit
10. A record showing which user has accessed a given resource and what operations the user performed during a given period.
encryption
Internet Protocol (IP)
Anonymizer
Audit Trail
11. A host designed to collect data on suspicious activity.
honeypot
INFOSEC Assessment Methodology (IAM)
Tunneling
DNS enumeration
12. The contents of a packet. A system attack requires the attacker to deliver a malicious payload that is acted upon and executed by the system.
ring topology
Banner Grabbing
Uniform Resource Locator (URL)
payload
13. A wireless access point that has either been installed on a secure company network without explicit authorization from a local network administrator - or has been created to allow a hacker to conduct a man-in-the-middle attack.
rogue access point
Domain Name System (DNS) lookup
Filter
source routing
14. Wireless LAN standards created by IEEE. 802.11a runs at up to 54Mbps at 5GHz - 802.11b runs at 11Mbps at 2.4GHz - 802.11g runs at 54Mbps at 2.4GHz - and 802.11n can run upwards of 150MBps.
shoulder surfing
802.11
Replacing numbers in a url to access other files
Post Office Protocol 3 (POP3)
15. Actions - devices - procedures - techniques - or other measures intended to reduce the vulnerability of an information system.
Countermeasures
Audit Data
-sF
fragmentation
16. Layer 2 of the OSI reference model. This layer provides reliable transit of data across a physical link. The Data Link layer is concerned with physical addressing - network topology - access to the network medium - error detection - sequential delive
-oG
Asymmetric Algorithm
encapsulation
Data Link layer
17. The act of using numerous electronic serial numbers on a cell phone until a valid number is located.
HTTP tunneling
hacktivism
Tumbling
Defines legal email marketing
18. Originally an extension of PPP - this is a protocol for authentication used within wireless networks. Works with multiple authentication measures.
network interface card (NIC)
Extensible Authentication Protocol (EAP)
SAM
keylogger
19. UDP Scan
Echo Reply
Address Resolution Protocol (ARP)
Smurf attack
-sU
20. A type of malware that covertly collects information about a user.
spyware
Videocipher II Satellite Encryption System
rule-based access control
-sU
21. Weakness in an information system - system security procedures - internal controls - or implementation that could be exploited or triggered by a threat source.
net use \[target ip]IPC$ '' /user:''
Time To Live (TTL)
Vulnerability
SID
22. Insane scan timing
passive attack
Competitive Intelligence
parallel scan & 75 sec timeout & 0.3 sec/probe
spoofing
23. A routing protocol developed to be used within a single organization.
Interior Gateway Protocol (IGP)
Address Resolution Protocol (ARP)
International Organization for Standardization (ISO)
802.11 i
24. A defined measure of service within a network system
audit
-oX
Audit Data
quality of service (QoS)
25. Using conversation or some other interaction between people to gather useful information.
stream cipher
Serial Line Internet Protocol (SLIP)
Domain Name System (DNS) cache poisoning
human-based social engineering
26. Also known as a digital certificate - this is an electronic file used to verify a user's identity - providing non-repudiation throughout the system It is also a set of data that uniquely identifies an entity. Certificates contain the entity's public
parallel scan & 300 sec timeout & 1.25 sec/probe
Certificate
Exposure Factor
John the Ripper - LOphtcrack - Ophtcrack - Cain and Abel
27. A network traffic management technique designed to allow applications to specify the route a packet will take to a destination - regardless of what the route tables between the two systems say.
DNS
Active Attack
source routing
Annualized Loss Expectancy (ALE)
28. Part of a service contract where the level of service is formally defined; may be required as part of the initial pen test agreements.
Information Technology (IT) infrastructure
Trojan Horse
service level agreements (SLAs)
Minimum acceptable level of risk
29. An attacker who breaks into computer systems with malicious intent - without the owner's knowledge or permission.
Black Hat
Certificate
hardware keystroke logger
Destination Unreachable
30. A file system used by the Mac OS.
Assessment
reconnaissance
Hierarchical File System (HFS)
initial sequence number (ISN)
31. A protocol for transporting data packets across a packet switched internetwork (such as the Internet). IP is a routed protocol.
Transmission Control Protocol (TCP)
Virus Hoax
Internet Protocol (IP)
Corrective Controls
32. A set of rules defined to screen network packets based on source address - destination address - or protocol; these rules determine whether the packet will be forwarded or discarded.
R
Filter
Contingency Plan
Cookie
33. TCP connect() scan
Tunneling Virus
Denial of Service (DoS)
payload
-sT
34. ACK Scan
SNMP
-sA
security bulletins
private key
35. A systematic process for the assessment of security vulnerabilities.
Finding a directory listing and gaining access to a parent or root file for access to other files
Echo request
INFOSEC Assessment Methodology (IAM)
honeypot
36. The act of checking some sequence of tokens for the presence of the constituents of some pattern.
Domain Name System (DNS) lookup
public key
pattern matching
Due Care
37. A suite of protocols used for securing Internet Protocol (IP) communications by authenticating and encrypting each IP packet of a communication session. This suite includes protocols for establishing mutual authentication between agents at the sessio
Internet Protocol Security (IPSec) architecture
packet filtering
session hijacking
Administratively Prohibited
38. The security property that data is not modified in an unauthorized and undetected manner. Also - the principle and measures taken to ensure that data received is in the exact same condition and state as when it was originally transmitted.
integrity
secure channel
Detective Controls
Simple Network Management Protocol (SNMP)
39. A text file stored within a browser by a web server that maintains information about the connection. Cookies are used to store information to maintain a unique but consistent surfing experience - but can also contain authentication parameters. Cookie
intrusion prevention system (IPS)
public key
Cookie
ECHO reply
40. Phases of an attack
Back orifice
stateful packet filtering
-sU
Reconnaissance - Scanning - Gaining Access - Maintaining Access - Covering Tracks
41. 18 U.S.C. 1029
Event
pattern matching
Possession of access devices
NT LAN Manager (NTLM)
42. A program or piece of code inserted into a system - usually covertly - with the intent of compromising the confidentiality - integrity - or availability of the victim's data - applications - or operating system. Malware consists of viruses - worms -
Malware
Virus
Asynchronous
Cryptographic Key
43. Port 88
Covert Channel
Kerberos
logic bomb
non-repudiation
44. A device or service designed to obfuscate traffic between a client and the Internet. Generally used to make activity on the Internet as untraceable as possible.
Media Access Control (MAC)
Anonymizer
Tunneling
Simple Object Access Protocol (SOAP)
45. A protocol that allows a client computer to request services from a server and the server to return the results.
remote procedure call (RPC)
Network Basic Input/Output System (NetBIOS)
parallel scan & 300 sec timeout & 1.25 sec/probe
A
46. A wireless LAN device that acts as a central point for all wireless traffic. The AP is connected to both the wireless LAN and the wired LAN - providing wireless clients access to network resources.
-sL
sniffer
Competitive Intelligence
Access Point (AP)
47. Controls internal to a system designed to resolve vulnerabilities and errors soon after they arise.
Internet Control Message Protocol (ICMP)
Corrective Controls
flood
Web Spider
48. The combination of all IT assets - resources - components - and systems.
Information Technology (IT) infrastructure
intranet
Self Replicating
honeypot
49. A list of IP addresses and corresponding MAC addresses stored on a local computer.
U P F
Interior Gateway Protocol (IGP)
Address Resolution Protocol (ARP) table
DNS enumeration
50. Malicious code that uses a polymorphic engine to mutate while keeping the original algorithm intact; the code changes itself each time it runs - but the function of the code will not change.
Asynchronous
Digital Watermarking
Directory Traversal
polymorphic virus