SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A computer network confined to a relatively small area - such as a single building or campus.
local area network (LAN)
limitation of liability and remedies
Distributed DoS (DDoS)
-sS
2. An electronic version of junk mail. Unsolicited commercial e-mail sent to numerous recipients.
Unicode
Timestamping
spam
Smurf attack
3. Version Detection Scan
-sV
Decryption
Annualized Loss Expectancy (ALE)
secure channel
4. don't ping
Buffer
-P0
Vulnerability Management
security controls
5. Terminal Access Controller Access-Control System. A remote authentication protocol that is used to communicate with an authentication server commonly used in Unix networks.
Methodology
Application-Level Attacks
gap analysis
TACACS
6. A decision to reduce the potential for damage to or loss of an IT asset by taking some type of action
Blowfish
-sX
risk avoidance
NT LAN Manager (NTLM)
7. ICMP Timestamp
GET
Google hacking
gray box testing
-PP
8. Access by information systems (or users) communicating from outside the information system security perimeter.
Anonymizer
remote access
Wireless Local Area Network (WLAN)
ping sweep
9. ICMP Type/Code 0-0
script kiddie
private network address
Echo Reply
Third Party
10. A fully qualified domain name consists of a host and domain name - including a top-level domain such as .com - .net - .mil - .edu -and so on.
HTTP
fully qualified domain name (FQDN)
A
reconnaissance
11. A virus that plants itself in a system's boot sector and infects the master boot record.
Boot Sector Virus
Buffer Overflow
Authentication
Detective Controls
12. A network system of servers that translates numeric Internet Protocol (IP) addresses into human-friendly - hierarchical Internet addresses - and vice versa.
SID
Distributed DoS (DDoS)
Domain Name System (DNS)
Information Technology (IT) asset criticality
13. Cracking Tools
Level I assessment
Trusted Computer Base (TCB)
Cloning
John the Ripper - LOphtcrack - Ophtcrack - Cain and Abel
14. Aggressive scan timing
Wiretapping
Possession of access devices
Unicode
parallel scan & 300 sec timeout & 1.25 sec/probe
15. Hex 04
Overwhelm CAM table to convert switch to hub mode
R
Distributed DoS (DDoS)
Accountability
16. An attacker who breaks into computer systems with malicious intent - without the owner's knowledge or permission.
spyware
Back orifice
Domain Name
Black Hat
17. White box test
Due Diligence
Secure Multipurpose Mail Extension (S/MIME)
Internal access to the network
heuristic scanning
18. nmap all output
-oA
Access Control List (ACL)
shoulder surfing
Information Technology (IT) security architecture and framework
19. A tool that helps a company to compare its actual performance with its potential performance.
qualitative analysis
Trojan Horse
local area network (LAN)
gap analysis
20. Incremental Substitution
The automated process of proactively identifying vulnerabilities of computing systems present in a network
Replacing numbers in a url to access other files
Extensible Authentication Protocol (EAP)
quality of service (QoS)
21. Formerly Redundant Array of Inexpensive Disks; a technology that provides increased storage functions and reliability through redundancy. This is achieved by combining multiple disk drive components into a logical unit - where data is distributed acr
RxBoot
Man-in-the-middle attack
Computer Emergency Response Team (CERT)
Redundant Array of Independent Disks (RAID)
22. A set of hardware - software - people - policies - and procedures needed to create - manage - distribute - use - store - and revoke digital certificates.
serial scan & 300 sec wait
Acceptable Use Policy (AUP)
spoofing
public key infrastructure (PKI)
23. A protocol for exchanging packets over a serial line.
Tunneling Virus
Serial Line Internet Protocol (SLIP)
Ethical Hacker
-PT
24. An announcement - typically from a software vendor - of a known security vulnerability in a program; often the bulletin contains instructions for the application of a software patch.
security bulletins
Time Bomb
Reconnaissance - Scanning - Gaining Access - Maintaining Access - Covering Tracks
U P F
25. A defined measure of service within a network system
Port Address Translation (PAT)
service level agreements (SLAs)
quality of service (QoS)
Replacing numbers in a url to access other files
26. A standard that provides best-practice recommendations on information security management for use by those responsible for initiating - implementing - or maintaining Information Security Management Systems (ISMS). Information security is defined with
Transport Layer Security (TLS)
Trapdoor Function
Transmission Control Protocol (TCP)
ISO 17799
27. A computer security expert who performs security audits and penetration tests against systems or network segments - with the owner's full knowledge and permission - in an effort to increase security.
Buffer
security defect
Ethical Hacker
-PT
28. A wireless access point that has either been installed on a secure company network without explicit authorization from a local network administrator - or has been created to allow a hacker to conduct a man-in-the-middle attack.
Authorization
Adware
risk transference
rogue access point
29. Wrapper or Binder
GET
Common Internet File System/Server Message Block
Traceroute
Real application encompassing Trojan
30. Port 161/162
SNMP
Directory Traversal
Echo request
OpenBSD
31. The means by which a recipient of a message can ensure the identity of the sender and that neither party can deny having sent or received the message. The most common method is through digital certificates.
Collision Domain
A R
Bluesnarfing
non-repudiation
32. Nmap normal output
Electronic Code Book (ECB)
-oN
hash
Internet Control Message Protocol (ICMP)
33. The process of systematically testing each port on a firewall to map rules and determine accessible ports.
firewalking
logic bomb
symmetric encryption
proxy server
34. Using conversation or some other interaction between people to gather useful information.
human-based social engineering
sidejacking
Minimum acceptable level of risk
War Driving
35. Manipulating a search string with additional specific operators to search for vulnerabilities or very specific information.
A series of messages sent by someone attempting to break into a computer to learn about the computer's network services.
Assessment
Google hacking
Transport Layer Security (TLS)
36. The condition of a resource being ready for use and accessible by authorized users.
initial sequence number (ISN)
Availability
security bulletins
International Organization for Standardization (ISO)
37. A network traffic management technique designed to allow applications to specify the route a packet will take to a destination - regardless of what the route tables between the two systems say.
Certificate
piggybacking
source routing
Event
38. Any circumstance or event with the potential to adversely impact organizationaloperations - organizational assets - or individuals through an information system via unauthorized access - destruction - disclosure - modification of information - and/or
honeypot
Threat
signature scanning
Availability
39. Nmap grepable output
-oG
DNS enumeration
-sI
security by obscurity
40. A brand name of analog scrambling and de-scrambling equipment for cable and satellite television - invented primarily to keep consumer Television receive-only (TVRO) satellite equipment from receiving TV programming except on a subscription basis.
Backdoor
Videocipher II Satellite Encryption System
Asset
routed protocol
41. A method of defining what rights and permissions an entity has to a given resource. In networking - Access Control Lists are commonly associated with firewall and router traffic filtering rules.
ring topology
RID Resource identifier
Access Control List (ACL)
Smurf attack
42. Method used by antivirus software to detect new - unknown viruses that have not yet been identified; based on a piece-by-piece examination of a program - looking for a sequence or sequences of instructions that differentiate the virus from 'normal' p
Trusted Computer Base (TCB)
heuristic scanning
Internal access to the network
Unicode
43. A connection-oriented - layer 4 protocol for transporting data over network segments. TCP is considered reliable because it guarantees delivery and the proper reordering of transmitted packets. This protocol is used for most long-haul traffic on the
Threat
Transmission Control Protocol (TCP)
Vulnerability Assessment
Zone transfer
44. An attack against an authentication protocol in which the attacker intercepts data in transit along the network between the claimant and verifier - but does not alter the data (in other words - eavesdropping).
RPC-DCOM
Man-in-the-middle attack
Buffer
passive attack
45. An attack that exploits the common mistake many people make when installing operating systems
Uniform Resource Locator (URL)
serialize scans & 0.4 sec wait
Trojan Horse
operating system attack
46. Evaluation in which testers attempt to penetrate the network.
sniffer
firewalking
Level III assessment
Simple Mail Transfer Protocol (SMTP)
47. A communications protocol used for browsing the Internet.
File Allocation Table (FAT)
Data Link layer
Archive
Hypertext Transfer Protocol (HTTP)
48. A standard for encrypting and authenticating MIME data; used primarily for Internet e-mail.
Timestamping
hashing algorithm
Trapdoor Function
Secure Multipurpose Mail Extension (S/MIME)
49. The Security Accounts Manager file in Windows stores all the password hashes for the system.
Trusted Computer Base (TCB)
Active Fingerprinting
Time exceeded
SAM
50. A denial-of-service attack where the attacker sends a ping to the network's broadcast address from the spoofed IP address of the target. All systems in the subnet then respond to the spoofed address - eventually flooding the device.
router
Smurf attack
Wi-Fi Protected Access (WPA)
Interior Gateway Protocol (IGP)