SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The potential for damage to or loss of an IT asset
hot site
Finger
risk
false negative
2. Port 80/81/8080
self encrypting
HTTP
Exploit
Target Of Engagement (TOE)
3. A set of hardware - software - people - policies - and procedures needed to create - manage - distribute - use - store - and revoke digital certificates.
-sP
Crossover Error Rate (CER)
-P0
public key infrastructure (PKI)
4. A piece of software - provided by the vendor - intended to update or fix known - discovered problems in a computer program or its supporting data.
stream cipher
Time exceeded
patch
Administratively Prohibited
5. The rate at which a biometric system will incorrectly identify an unauthorized individual and allow them access (see false negative).
Address Resolution Protocol (ARP)
network tap
net use \[target ip]IPC$ '' /user:''
False Acceptance Rate (FAR)
6. A network administration command-line tool available for many operating systems for querying the Domain Name System (DNS) to obtain domain name or IP address mappings or any other specific DNS record.
nslookup
flood
personal identification number (PIN)
Bastion host
7. A protocol used to pass control and error messages between nodes on the Internet.
Internet Control Message Protocol (ICMP)
null session
proxy server
Collision Domain
8. A record showing which user has accessed a given resource and what operations the user performed during a given period.
sheepdip
Audit Trail
Data Link layer
LDAP
9. Originally an extension of PPP - this is a protocol for authentication used within wireless networks. Works with multiple authentication measures.
Active Fingerprinting
Finding a directory listing and gaining access to a parent or root file for access to other files
Database
Extensible Authentication Protocol (EAP)
10. A software license agreement; a contract between the 'licensor' and purchaser establishing the right to use the software.
End User Licensing Agreement (EULA)
Trusted Computer System Evaluation Criteria (TCSEC)
Web Spider
forwarding
11. A distance-vector routing protocol that employs the hop count as a routing metric. The 'hold down time -' used to define how long a route is held in memory - is 180 seconds. RIP prevents routing loops by implementing a limit on the number of hops all
inference attack
Authentication
Vulnerability Scanning
Routing Information Protocol (RIP)
12. A situation in which an IDS or other sensor triggers on an event as an intrusion attempt - when it was actually legitimate traffic.
port redirection
false negative
Overwhelm CAM table to convert switch to hub mode
Defines legal email marketing
13. The subjective - potential percentage of loss to a specific asset if a specific threat is realized. The exposure factor (EF) is a subjective value the person assessing risk must define.
Secure Multipurpose Mail Extension (S/MIME)
Exposure Factor
local area network (LAN)
Application Layer
14. Aggressive scan timing
Cache
Exposure Factor
honeynet
parallel scan & 300 sec timeout & 1.25 sec/probe
15. The transmission of digital signals without precise clocking or synchronization.
Malicious code
SID
asynchronous transmission
Anonymizer
16. Controlling access to a network by analyzing the headers of incoming and outgoing packets - and letting them pass or discarding them based on rule sets created by a network administrator. A packet filter allows or denies packets based on destination
-sO
packet filtering
sniffer
footprinting
17. Software code - a portion of data - or sequence of commands intended to take advantage of a bug or vulnerability in order to cause unintended or unanticipated behavior to occur on computer software or hardware.
Block Cipher
Virus Hoax
Exploit
R
18. Polymorphic Virus
Access Control List (ACL)
open source
passive attack
self encrypting
19. A portion of memory used to temporarily store output or input data.
U P F
802.11 i
Buffer
-P0
20. TCP connect() scan
-sR
-sT
SSH
A series of messages sent by someone attempting to break into a computer to learn about the computer's network services.
21. Software or firmware intended to perform an unauthorized process that will have an adverse impact on the confidentiality - integrity - or availability of an information system. A virus - worm - Trojan horse - or other code-based entity that infects a
role-based access control
Malicious code
Hypertext Transfer Protocol Secure (HTTPS)
Rijndael
22. The rate at which a biometric system will incorrectly reject an access attempt by an authorized user.
Data Link layer
false rejection rate (FRR)
Tumbling
Distributed DoS (DDoS)
23. A social-engineering attack that manipulates the victim into calling the attacker for help.
reverse social engineering
Serial Line Internet Protocol (SLIP)
network access server
Access Creep
24. Port 88
stream cipher
POST
Kerberos
hot site
25. Text or data in its encrypted form; the result of plaintext being input into a cryptographic algorithm.
Block Cipher
Ciphertext
ping sweep
Mantrap
26. A storage buffer that transparently stores data so future requests for the same data can be served faster.
Certificate Authority (CA)
fragmentation
Trojan Horse
Cache
27. A method of evaluating the security of a computer system or network by simulating an attack from a malicious source.
Time Bomb
penetration testing
parallel scan & 300 sec timeout & 1.25 sec/probe
integrity
28. MAC Flooding
DNS enumeration
Overwhelm CAM table to convert switch to hub mode
Bit Flipping
GET
29. An HTTP command to transmit text to a web server for processing. The opposite of an HTTP GET.
Tini
-sS
POST
identity theft
30. A TCP flag notifying an originating station that the preceding packet (or packets) has been received.
shoulder surfing
Timestamping
XOR Operation
Acknowledgment (ACK)
31. Hashing algorithm that results in a 128-bit output.
MD5
Algorithm
Vulnerability
qualitative analysis
32. CAN-SPAM
intrusion detection system (IDS)
-sX
Defines legal email marketing
enumeration
33. Port 31337
Droppers
phishing
Back orifice
secure channel
34. Independent review and examination of records and activities to assess the adequacy of system controls - to ensure compliance with established policies and operational procedures - and to recommend necessary changes.
Cryptographic Key
Accountability
audit
Serial Line Internet Protocol (SLIP)
35. Hex 14
human-based social engineering
A R
Hypertext Transfer Protocol (HTTP)
Internet Control Message Protocol (ICMP)
36. Created by the U.S. Federal Communications Commission to uniquely identify mobile devices; often represented as an 11-digit decimal number or eight-digit hexadecimal number.
Contingency Plan
Level III assessment
steganography
Electronic serial number
37. A non-self-replicating program that appears to have a useful purpose - but in reality has a different - malicious purpose.
protocol
Trojan Horse
net use \[target ip]IPC$ '' /user:''
private network address
38. FIN Scan
-sF
Black Box Testing
A series of messages sent by someone attempting to break into a computer to learn about the computer's network services.
LDAP
39. Port 22
Auditing
False Acceptance Rate (FAR)
Tunnel
SSH
40. A protocol that allows a client computer to request services from a server and the server to return the results.
asynchronous transmission
shoulder surfing
remote procedure call (RPC)
Mandatory access control (MAC)
41. Policy stating what users of a system can and cannot do with the organization's assets.
hot site
Back orifice
Acceptable Use Policy (AUP)
serialize scans & 0.4 sec wait
42. The cyclical practice of identifying - classifying - remediating - and mitigating vulnerabilities.
Audit Trail
Worm
Block Cipher
Vulnerability Management
43. An attacker who breaks into computer systems with malicious intent - without the owner's knowledge or permission.
Presentation layer
-PI
Black Hat
node
44. A network deployed as a trap to detect - deflect - or deter unauthorized use of information systems.
security kernel
Bluesnarfing
honeynet
Trusted Computer Base (TCB)
45. A device that receives and sends data packets between two or more networks; the packet headers and a forwarding table provide the router with the information necessary for deciding which interface to use to forward packets.
-PT
S
router
SOA record
46. Physical socket provided on routers and switches for cable connections between a computer and the router/switch. This connection enables the computer to configure - query - and troubleshoot the router/switch by use of a terminal emulator and a comman
Overwhelm CAM table to convert switch to hub mode
Vulnerability Assessment
firewall
Console Port
47. Layer 7 of the OSI reference model. The Application layer provides services to applications - which allow them access to the network. Protocols such as FTP and SMTP reside here.
-sO
shoulder surfing
XOR Operation
Application Layer
48. Unauthorized access to information such as a calendar - contact list - e-mails - and text messages on a wireless device through a Bluetooth connection.
Temporal Key Integrity Protocol (TKIP)
Bluesnarfing
suicide hacker
White Box Testing
49. Provides router-to-router or host-to-network connections over asynchronous and synchronous circuits.
port scanning
hashing algorithm
Point-to-Point Protocol (PPP)
Target Of Engagement (TOE)
50. Nmap ml output
gateway
Zero Subnet
-oX
Discretionary Access Control (DAC)