SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. An attack in which a hacker steps between two ends of an already-established communication session and uses specialized tools to guess sequence numbers to take over the channel.
session hijacking
serial scan & 300 sec wait
Common Internet File System/Server Message Block
Request for Comments (RFC)
2. A TCP flag notifying an originating station that the preceding packet (or packets) has been received.
payload
Acknowledgment (ACK)
route
Secure Multipurpose Mail Extension (S/MIME)
3. A string that represents the location of a web resource
network interface card (NIC)
iris scanner
Uniform Resource Locator (URL)
Adware
4. An attack where the hacker repeats a portion of a cryptographic exchange in hopes of fooling the system into setting up a communications channel.
packet
Acknowledgment (ACK)
Due Care
replay attack
5. Transmitting one protocol encapsulated inside another protocol.
Virtual Local Area Network (VLAN)
Post Office Protocol 3 (POP3)
Self Replicating
Tunneling
6. An attack that is direct in nature - usually where the attacker injects something into - or otherwise alters - the network or system target.
hashing algorithm
Active Attack
CNAME record
net use \[target ip]IPC$ '' /user:''
7. A free and popular version of the Unix operating system.
U P F
Daisy Chaining
parallel scan & 75 sec timeout & 0.3 sec/probe
FreeBSD
8. A function that is easy to compute in one direction - yet believed to be difficult to compute in the opposite direction (finding its inverse) without special information - called the 'trapdoor.' Widely used in cryptography.
-sO
Telnet
Trapdoor Function
false rejection rate (FRR)
9. A proprietary - open - wireless technology used for transferring data from fixed and mobile devices over short distances.
Bluetooth
Certificate
penetration testing
Fast Ethernet
10. Normal scan timing
Domain Name System (DNS) cache poisoning
Information Technology (IT) asset criticality
parallel scan
Institute of Electrical and Electronics Engineers (IEEE)
11. A formal set of rules describing data transmission - especially across a network. A protocol determines the type of error checking - the data compression method - how the sending device will indicate completion - how the receiving device will indicat
protocol
Possession of access devices
security incident response team (SIRT)
asynchronous transmission
12. A small space having two sets of interlocking doors; the first set of doors must close before the second set opens. Typically authentication is required for each door - often using different factors. For example - a smart card may open the first door
Copyright
Mantrap
routed protocol
Discretionary Access Control (DAC)
13. The organization that governs the Internet's top-level domains - IP address allocation - and port number assignments.
Banner Grabbing
stream cipher
Malicious code
Internet Assigned Number Authority (IANA)
14. An industry standard protocol used for accessing and managing information within a directory service; an application protocol for querying and modifying data using directory services running over TCP/IP.
Lightweight Directory Access Protocol (LDAP)
private network address
Destination Unreachable
Password Authentication Protocol (PAP)
15. nmap
hardware keystroke logger
-p <port ranges>
--randomize_hosts -O OS fingerprinting
Cracker
16. A symmetric key cipher where plaintext bits are combined with a pseudo-random cipher bit stream (keystream) - typically by an exclusive-or (XOR) operation. In a stream cipher the plaintext digits are encrypted one at a time - and the transformation o
Finding a directory listing and gaining access to a parent or root file for access to other files
Echo Reply
Database
stream cipher
17. The directory service created by Microsoft for use on itsnetworks. Provides a variety of network services using Lightweight Directory Access Protocol (LDAP) - Kerberos-based authentication - and single sign-on for user access to network-based resourc
No previous knowledge of the network
POP 3
Virus
Active Directory (AD)
18. A standard that provides best-practice recommendations on information security management for use by those responsible for initiating - implementing - or maintaining Information Security Management Systems (ISMS). Information security is defined with
Buffer Overflow
ISO 17799
Acknowledgment (ACK)
Wiretapping
19. A skilled hacker that straddles the line between white hat (hacking only with permission and within guidelines) and black hat (malicious hacking for personal gain). Gray hats sometime perform illegal acts to exploit technology with the intent of achi
Password Authentication Protocol (PAP)
gray hat
parallel scan
Filter
20. A type of malware that covertly collects information about a user.
FreeBSD
protocol
personal identification number (PIN)
spyware
21. Incremental Substitution
Blowfish
Domain Name System (DNS) cache poisoning
War Dialing
Replacing numbers in a url to access other files
22. Drawing symbols in public places to alert others to an open Wi-Fi network. War chalking can include the SSIDs - administrative passwords to APs - and other information.
-sA
service level agreements (SLAs)
War Chalking
No previous knowledge of the network
23. A self-replicating malicious program that attempts installation beneath antivirus software by directly intercepting the interrupt handlers of the operating system to evade detection.
Annualized Loss Expectancy (ALE)
Tunneling Virus
Fiber Distributed Data Interface (FDDI)
User Datagram Protocol (UDP)
24. Sending packets or requests to another system to gain information to be used to identify weaknesses and protect the system from attacks.
iris scanner
RxBoot
User Datagram Protocol (UDP)
Vulnerability Scanning
25. A group of people - gathered together by a business entity - working to address a specific problem or goal.
Tiger Team
Zombie
remote access
asynchronous transmission
26. A program designed to execute at a specific time to release malicious code onto the computer system or network.
-PB
Time Bomb
Annualized Loss Expectancy (ALE)
SMB
27. Looking over an authorized user's shoulder in order to steal information (such as authentication information).
Vulnerability Assessment
Distributed DoS (DDoS)
site survey
shoulder surfing
28. A sublayer of layer 2 of the OSI model - the Data Link layer. It provides addressing and channel access control mechanisms that enable several terminals or network nodes to communicate within a multipoint network.
A
Bit Flipping
ping sweep
Media Access Control (MAC)
29. nmap
polymorphic virus
Bastion host
--randomize_hosts -O OS fingerprinting
Confidentiality
30. The Security Accounts Manager file in Windows stores all the password hashes for the system.
Methodology
SAM
NetBus
Archive
31. The means by which a recipient of a message can ensure the identity of the sender and that neither party can deny having sent or received the message. The most common method is through digital certificates.
-sO
reconnaissance
Access Creep
non-repudiation
32. Cracking Tools
Open System Interconnection (OSI) Reference Model
Local Administrator
parallel scan
John the Ripper - LOphtcrack - Ophtcrack - Cain and Abel
33. The cyclical practice of identifying - classifying - remediating - and mitigating vulnerabilities.
network operations center (NOC)
Vulnerability Scanning
Vulnerability Management
Tunnel
34. A free - open source version of the Berkeley Software Distribution of Unix - often used in embedded systems.
A procedure for identifying active hosts on a network.
Fraud and related activity in connection with computers
Active Directory (AD)
NetBSD
35. The exploitation of a security vulnerability
security breach or security incident
integrity
Methodology
POP 3
36. A piece of code intentionally inserted into a software system that will perform a malicious function when specified conditions are met at some future point.
parallel scan & 75 sec timeout & 0.3 sec/probe
segment
logic bomb
Authentication Header (AH)
37. White hat
Collision
risk acceptance
Hacks with permission
Minimum acceptable level of risk
38. An evaluation consisting of a document review - interviews - and demonstrations. No hands-on testing is performed.
Level I assessment
inference attack
Domain Name System (DNS) cache poisoning
stateful packet filtering
39. Provides data encryption for IEEE 802.11 wireless networks so data can only be decrypted by the intended recipients.
firewall
Wi-Fi Protected Access (WPA)
Sign in Seal
SYN flood attack
40. Unauthorized access to information such as a calendar - contact list - e-mails - and text messages on a wireless device through a Bluetooth connection.
spoofing
Bluesnarfing
patch
Finger
41. Originally an extension of PPP - this is a protocol for authentication used within wireless networks. Works with multiple authentication measures.
Videocipher II Satellite Encryption System
Extensible Authentication Protocol (EAP)
NetBus
Data Link layer
42. A symmetric key cryptographic algorithm that transforms a block of information at a time using a cryptographic key. For a block cipher algorithm - the length of the input block is the same as the length of the output block.
honeynet
Block Cipher
Filter
nslookup
43. The process of sending a packet or frame toward the destination. In a switch - messages are forwarded only to the port they are addressed to.
forwarding
Algorithm
out-of-band signaling
INFOSEC Assessment Methodology (IAM)
44. The act of dialing all numbers within an organization to discover open modems.
Audit Data
Exploit
Temporal Key Integrity Protocol (TKIP)
War Dialing
45. The process of a system providing a fully qualified domain name (FQDN) to a local name server - for resolution to its corresponding IP address.
source routing
Level I assessment
Target Of Engagement (TOE)
Domain Name System (DNS) lookup
46. A partially protected zone on a network - not exposed to the full fury of the Internet - but not fully behind the firewall. This technique is typically used on parts of the network that must remain open to the public (such as a web server) but must a
Cryptography
Daemon
Demilitarized Zone (DMZ)
Possession of access devices
47. The secret portion of an asymmetric key pair typically used to decrypt or digitally sign data. The private key is never shared and is always used for decryption - with one notable exception: The private key is used to encrypt the digital signature.
rogue access point
Certificate
Port Address Translation (PAT)
private key
48. A method of password cracking whereby all possible options are systematically enumerated until a match is found. These attacks try every password (or authentication option) - one after another - until successful. Bruteforce attacks take a long time t
Access Creep
Assessment
RPC-DCOM
Brute-Force Password Attack
49. The process of determining if a network entity (user or service) is legitimate
Authentication
Hierarchical File System (HFS)
parallel scan & 300 sec timeout & 1.25 sec/probe
separation of duties
50. The monetary value expected from the occurrence of a risk on an asset. It is mathematically expressed as single loss expectancy (SLE) = asset value (AV)
Asynchronous
single loss expectancy (SLE)
serialize scans & 0.4 sec wait
-PS