SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A distance-vector routing protocol that employs the hop count as a routing metric. The 'hold down time -' used to define how long a route is held in memory - is 180 seconds. RIP prevents routing loops by implementing a limit on the number of hops all
-oG
polymorphic virus
Routing Information Protocol (RIP)
encryption
2. Originally an extension of PPP - this is a protocol for authentication used within wireless networks. Works with multiple authentication measures.
-sU
Extensible Authentication Protocol (EAP)
Time Bomb
Blowfish
3. A computer placed outside a firewall to provide public services to other Internet sites - and hardened to resist external attacks.
Hacks without permission
spam
Routing Protocol
Bastion host
4. As an identification device becomes more sensitive or accurate - its FAR decreases while its FRR increases. The CER is the point at which these two rates are equal - or cross over.
false rejection rate (FRR)
Collision Domain
John the Ripper - LOphtcrack - Ophtcrack - Cain and Abel
Authentication
5. An attack in which a hacker steps between two ends of an already-established communication session and uses specialized tools to guess sequence numbers to take over the channel.
session hijacking
quantitative risk assessment
Internet Assigned Number Authority (IANA)
Challenge Handshake Authentication Protocol (CHAP)
6. In penetration testing - enumeration is the act of querying a device or network segment thoroughly and systematically for information.
Dumpster Diving
enumeration
A series of messages sent by someone attempting to break into a computer to learn about the computer's network services.
Timestamping
7. A string that represents the location of a web resource
Exploit
Uniform Resource Locator (URL)
802.11
Ciphertext
8. RPC Scan
network tap
-sR
Fiber Distributed Data Interface (FDDI)
Pretty Good Privacy (PGP)
9. The secret portion of an asymmetric key pair typically used to decrypt or digitally sign data. The private key is never shared and is always used for decryption - with one notable exception: The private key is used to encrypt the digital signature.
sniffer
Detective Controls
Mantrap
private key
10. A communications channel that is being used for a purpose it was not intended for - usually to transfer information secretly.
Macro virus
Covert Channel
reconnaissance
Methodology
11. A computer network confined to a relatively small area - such as a single building or campus - in which devices connect through high-frequency radio waves using IEEE standard 802.11.
Wireless Local Area Network (WLAN)
Cookie
404EE
-oX
12. A method in cryptography by which cryptographic keys are exchanged between users - allowing use of a cryptographic algorithm (for example - the Diffie-Hellman key exchange).
key exchange protocol
Boot Sector Virus
Simple Mail Transfer Protocol (SMTP)
CAM table
13. A Windows-based GUI version of nmap.
Zenmap
Bluetooth
separation of duties
penetration testing
14. A computer system that performs tasks dictated by an attacker from a remote location. Zombies may be active or idle - and owners of the systems generally do not know their systems are compromised.
Certificate
A
key exchange protocol
Zombie
15. Using conversation or some other interaction between people to gather useful information.
Tunnel
Time To Live (TTL)
Packet Internet Groper (ping)
human-based social engineering
16. The set of all hardware - firmware - and/or software components critical to IT security. Bugs or vulnerabilities occurring inside the TCB might jeopardize the security properties of the entire system.
-sV
polymorphic virus
Trusted Computer Base (TCB)
Directory Traversal
17. A type of encryption where the same key is used to encrypt and decrypt the message.
Interior Gateway Protocol (IGP)
NetBus
symmetric encryption
Brute-Force Password Attack
18. A skilled hacker that straddles the line between white hat (hacking only with permission and within guidelines) and black hat (malicious hacking for personal gain). Gray hats sometime perform illegal acts to exploit technology with the intent of achi
Finding a directory listing and gaining access to a parent or root file for access to other files
parallel scan & 75 sec timeout & 0.3 sec/probe
gray hat
SNMP
19. A nonroutable IP address range intended for use only within the confines of a single organization - falling within the predefined ranges of 10.0.0.0 - 172.16-31.0.0 - or 192.168.0.0.
serial scan & 300 sec wait
Post Office Protocol 3 (POP3)
Digital Certificate
private network address
20. A partially protected zone on a network - not exposed to the full fury of the Internet - but not fully behind the firewall. This technique is typically used on parts of the network that must remain open to the public (such as a web server) but must a
Access Creep
scope creep
Demilitarized Zone (DMZ)
Overwhelm CAM table to convert switch to hub mode
21. A record showing which user has accessed a given resource and what operations the user performed during a given period.
Third Party
Wi-Fi
Collision
Audit Trail
22. Attacks that take advantage of the built-in code and scripts most off-the-shelf applications come with.
shrink-wrap code attacks
Information Technology Security Evaluation Criteria (ITSEC)
public key
hacktivism
23. A set of related communications protocols operating together as a group to address communication at some or all of the seven layers of the OSI reference model.
quality of service (QoS)
protocol stack
Zenmap
Rijndael
24. A security protocol for wireless local area networks defined in the 802.11b standard; intended to provide the same level of security as a wired LAN. WEP is not considered strong security - although it does authenticate clients to access points - encr
Eavesdropping
false rejection rate (FRR)
Digital Certificate
Wired Equivalent Privacy (WEP)
25. Port 389
Eavesdropping
Simple Mail Transfer Protocol (SMTP)
LDAP
quantitative risk assessment
26. A small space having two sets of interlocking doors; the first set of doors must close before the second set opens. Typically authentication is required for each door - often using different factors. For example - a smart card may open the first door
Asymmetric
Mantrap
Information Technology (IT) security architecture and framework
Hypertext Transfer Protocol Secure (HTTPS)
27. A biometric device that uses pattern-recognition techniques based on images of the irises of an individual's eyes.
Time exceeded
Media Access Control (MAC)
iris scanner
inference attack
28. Provides router-to-router or host-to-network connections over asynchronous and synchronous circuits.
LDAP
Point-to-Point Protocol (PPP)
serial scan & 300 sec wait
Electronic serial number
29. Authentication confirms the identity of the user or device. Authorization determines the privileges (rights) of the user or device. Accounting records the access attempts - both successful and unsuccessful.
Authentication - Authorization - and Accounting (AAA)
ad hoc mode
Google hacking
Certificate Authority (CA)
30. An announcement - typically from a software vendor - of a known security vulnerability in a program; often the bulletin contains instructions for the application of a software patch.
Zenmap
Information Technology (IT) infrastructure
Wiretapping
security bulletins
31. A group of people - gathered together by a business entity - working to address a specific problem or goal.
Zombie
parallel scan & 75 sec timeout & 0.3 sec/probe
Tiger Team
personal identification number (PIN)
32. A background process found in Unix - Linux - Solaris - and other Unix-based operating systems.
Exposure Factor
Daemon
ECHO reply
HTTP
33. Software used to bind a Trojan and a legitimate program together so the Trojan will be installed when the legitimate program is executed.
Wrapper
parallel scan & 300 sec timeout & 1.25 sec/probe
Wiretapping
Acceptable Use Policy (AUP)
34. Formal description and evaluation of the vulnerabilities in an information system
Finger
intranet
Vulnerability Assessment
Droppers
35. A TCP flag notifying an originating station that the preceding packet (or packets) has been received.
SNMP
Acknowledgment (ACK)
Directory Traversal
security breach or security incident
36. An outdated symmetric cipher encryption algorithm - previously U.S. government-approved and used by business and civilian government agencies. DES is no longer considered secure due to the ease with which the entire keyspace can be attempted using mo
out-of-band signaling
smart card
Internet Protocol (IP)
Data Encryption Standard (DES)
37. A software program for remotely controlling a Microsoft Windows computer system over a network. Generally considered malware.
network interface card (NIC)
Real application encompassing Trojan
risk
NetBus
38. Port 135
remote procedure call (RPC)
security breach or security incident
-oX
RPC-DCOM
39. A wireless LAN security standard developed by IEEE. Requires Temporal Key Integrity Protocol (TKIP) and Advanced Encryption Standard (AES).
Replacing numbers in a url to access other files
Media Access Control (MAC)
802.11 i
-p <port ranges>
40. The act of checking some sequence of tokens for the presence of the constituents of some pattern.
Wireless Local Area Network (WLAN)
pattern matching
RID Resource identifier
RPC-DCOM
41. Establish Null Session
net use \[target ip]IPC$ '' /user:''
Confidentiality
halo effect
Kerberos
42. Confidentiality - Integrity - and Availability are the three aspects of security and make up the triangle.
Overwhelm CAM table to convert switch to hub mode
Wrapper
CIA triangle
Syslog
43. Physical socket provided on routers and switches for cable connections between a computer and the router/switch. This connection enables the computer to configure - query - and troubleshoot the router/switch by use of a terminal emulator and a comman
qualitative analysis
Banner Grabbing
Buffer
Console Port
44. A domain composed of all the systems sharing any given physical transport media. Systems within a collision domain may collide with each other during the transmission of data. Collisions can be managed by CSMA/CD (collision detection) or CSMA/CA (col
Collision Domain
Interior Gateway Protocol (IGP)
802.11 i
S
45. Freely and readily available information on an organization that can be gathered by a business entity about its competitor's customers - products - and marketing - and can be used by an attacker to build useful information for further attacks.
Accountability
OpenBSD
hardware keystroke logger
Competitive Intelligence
46. A security protocol used in IEEE 802.11i to replace WEP without the requirement to replace legacy hardware.
risk avoidance
Temporal Key Integrity Protocol (TKIP)
End User Licensing Agreement (EULA)
reconnaissance
47. Activities to determine the extent to which a security control is implemented correctly - operating as intended - and producing the desired outcome with respect to meeting the security requirements for the system.
Domain Name System (DNS) lookup
Temporal Key Integrity Protocol (TKIP)
Assessment
Uniform Resource Locator (URL)
48. Insane scan timing
Zenmap
Common Internet File System/Server Message Block
parallel scan & 75 sec timeout & 0.3 sec/probe
Packet Internet Groper (ping)
49. A means of restricting access to system resources based on the sensitivity (as represented by a label) of the information contained in the system resource and the formal authorization (that is - clearance) of users to access information of such sensi
ISO 17799
Crossover Error Rate (CER)
Covert Channel
Mandatory access control (MAC)
50. ICMP Netmask
INFOSEC Assessment Methodology (IAM)
-PM
Transport Layer Security (TLS)
XOR Operation