SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Also known as a public key certificate - this is an electronic file that is used to verify a user's identity - providing non-repudiation throughout the sys-tem. Certificates contain the entity's public key - serial number - version - subject - algori
Echo request
Digital Certificate
War Driving
Ethernet
2. A measurable - physical characteristic used to recognize the identity - or verify the claimed identity - of an applicant. Facial images - fingerprints - and handwriting samples are all examples of biometrics.
Biometrics
Hierarchical File System (HFS)
security controls
Domain Name
3. Hashing algorithm that results in a 128-bit output.
MD5
Address Resolution Protocol (ARP)
private key
Information Technology (IT) security architecture and framework
4. An informed decision to accept the potential for damage to or loss of an IT asset.
false rejection rate (FRR)
spyware
polymorphic virus
risk acceptance
5. Created by the U.S. Federal Communications Commission to uniquely identify mobile devices; often represented as an 11-digit decimal number or eight-digit hexadecimal number.
Electronic serial number
Mandatory access control (MAC)
role-based access control
ring topology
6. The monetary loss that can be expected for an asset due to risk over a one-year period. ALE is the product of the annual rate of occurrence (ARO) and the single loss expectancy (SLE). It is mathematically expressed as ALE = ARO
route
Annualized Loss Expectancy (ALE)
steganography
Virus Hoax
7. A limit on the amount of time or number of iterations or transmissions in computer and network technology a packet can experience before it will be discarded.
Time To Live (TTL)
route
Certificate Authority (CA)
separation of duties
8. An attack in which the hacker can derive information from the ciphertext without actually decoding it. Sensitive information can be considered compromised if an adversary can infer its real value with a high level of confidence.
802.11
security incident response team (SIRT)
keylogger
inference attack
9. Normal scan timing
Telnet
parallel scan
Access Point (AP)
Time exceeded
10. An attack where the hacker positions himself between the client and the server - to intercept (and sometimes alter) data traveling between the two.
sniffer
Hacks with permission
Man-in-the-middle attack
Kerberos
11. TCP connect() scan
Bluetooth
Third Party
hybrid attack
-sT
12. A connection-oriented - layer 4 protocol for transporting data over network segments. TCP is considered reliable because it guarantees delivery and the proper reordering of transmitted packets. This protocol is used for most long-haul traffic on the
Possession of access devices
Information Technology (IT) asset criticality
Transmission Control Protocol (TCP)
Wrapper
13. An attack that combines a brute-force attack with a dictionary attack.
hybrid attack
Information Technology (IT) asset criticality
ad hoc mode
-PT
14. A virus that plants itself in a system's boot sector and infects the master boot record.
public key infrastructure (PKI)
asynchronous transmission
Console Port
Boot Sector Virus
15. A system used by the Securities and Exchange Commission (SEC) for companies and businesses to transmit required filings and information. The EDGAR database performs automated collection - validation - indexing - acceptance - and forwarding of submiss
Due Care
EDGAR database
TACACS
Application Layer
16. A social-engineering attack that manipulates the victim into calling the attacker for help.
DNS enumeration
reverse social engineering
CIA triangle
Data Link layer
17. A connectionless - layer 4 transport protocol. UDP is faster than TCP - but offers no reliability. A best effort is made to deliver the data - but no checks and verifications are performed to guarantee delivery. Therefore - UDP is termed a 'connectio
User Datagram Protocol (UDP)
National Security Agency
public key
open source
18. A set of related communications protocols operating together as a group to address communication at some or all of the seven layers of the OSI reference model.
Internet Protocol (IP)
gateway
protocol stack
Redundant Array of Independent Disks (RAID)
19. A protocol that allows a client computer to request services from a server and the server to return the results.
remote procedure call (RPC)
Authorization
forwarding
Digital Watermarking
20. A device that provides access between two or more networks. Gateways are typically used to connect dissimilar networks.
HTTP
gateway
Third Party
File Allocation Table (FAT)
21. Polymorphic Virus
File Allocation Table (FAT)
self encrypting
Virtual Local Area Network (VLAN)
Virus
22. A defined measure of service within a network system
Covert Channel
ISO 17799
quality of service (QoS)
Denial of Service (DoS)
23. Wireless LAN standards created by IEEE. 802.11a runs at up to 54Mbps at 5GHz - 802.11b runs at 11Mbps at 2.4GHz - 802.11g runs at 54Mbps at 2.4GHz - and 802.11n can run upwards of 150MBps.
802.11
router
Cloning
serial scan & 300 sec wait
24. ICMP Ping
nslookup
-PI
Interior Gateway Protocol (IGP)
Brute-Force Password Attack
25. IP Protocol Scan
-sO
spyware
Bastion host
Media Access Control (MAC)
26. The process of using easily accessible DNS records to map a target network's internal hosts.
DNS
DNS enumeration
Electronic serial number
Assessment
27. A software program for remotely controlling a Microsoft Windows computer system over a network. Generally considered malware.
NetBus
Mandatory access control (MAC)
Hypertext Transfer Protocol Secure (HTTPS)
initial sequence number (ISN)
28. The art and science of creating a covert message or image within another message - image - audio - or video file.
Internet Protocol (IP)
steganography
SMB
false negative
29. Version Detection Scan
-sV
Digital Certificate
Bit Flipping
Authorization
30. Establish Null Session
Information Technology Security Evaluation Criteria (ITSEC)
Access Control List (ACL)
net use \[target ip]IPC$ '' /user:''
session hijacking
31. A data encryption/decryption program often used for e-mail and file storage.
Pretty Good Privacy (PGP)
-oN
Information Technology (IT) asset valuation
Distributed DoS (DDoS)
32. Using conversation or some other interaction between people to gather useful information.
HIDS
flood
human-based social engineering
encryption
33. Hex 14
-sF
OpenBSD
A R
Daemon
34. A background process found in Unix - Linux - Solaris - and other Unix-based operating systems.
ring topology
Daemon
protocol
Domain Name System (DNS) lookup
35. Host-based IDS. An IDS that resides on the host - protecting against file and folder manipulation and other host-based attacks and actions.
Buffer Overflow
single loss expectancy (SLE)
Self Replicating
HIDS
36. Manipulating a search string with additional specific operators to search for vulnerabilities or very specific information.
Google hacking
RID Resource identifier
Transport Layer Security (TLS)
CAM table
37. A program designed to browse websites in an automated - methodical manner. Sometimes these programs are used to harvest information from websites - such as e-mail addresses.
gap analysis
Web Spider
Internet Protocol (IP)
Time Bomb
38. Sending packets or requests to another system to gain information to be used to identify weaknesses and protect the system from attacks.
Real application encompassing Trojan
-PT
footprinting
Vulnerability Scanning
39. A secret - typically consisting of only decimal digits - that a claimant memorizes and uses to authenticate his identity
identity theft
SYN flood attack
personal identification number (PIN)
POST
40. As an identification device becomes more sensitive or accurate - its FAR decreases while its FRR increases. The CER is the point at which these two rates are equal - or cross over.
Bluetooth
Wi-Fi Protected Access (WPA)
false rejection rate (FRR)
security by obscurity
41. Port 389
Zero Subnet
LDAP
footprinting
Audit Trail
42. The security property that data is not modified in an unauthorized and undetected manner. Also - the principle and measures taken to ensure that data received is in the exact same condition and state as when it was originally transmitted.
Ethical Hacker
Tiger Team
integrity
Malware
43. A trusted entity that issues and revokes public key certificates. In a network - a CA is a trusted entity that issues - manages - and revokes security credentials and public keys for message encryption and/or authentication. Within a public key infra
Certificate Authority (CA)
security bulletins
False Acceptance Rate (FAR)
Replacing numbers in a url to access other files
44. A type 0 ICMP message used to reply to ECHO requests. Used with ping to verify network layer connectivity between hosts.
proxy server
ECHO reply
Cryptography
audit
45. A cell phone attack in which the serial number from one cell phone is copied to another in an effort to copy the cell phone.
Level II assessment
INFOSEC Assessment Methodology (IAM)
RPC-DCOM
Cloning
46. Drawing symbols in public places to alert others to an open Wi-Fi network. War chalking can include the SSIDs - administrative passwords to APs - and other information.
Internet Protocol (IP)
enumeration
quality of service (QoS)
War Chalking
47. A person or entity indirectly involved in a relationship between two principles.
A procedure for identifying active hosts on a network.
operating system attack
network access server
Third Party
48. The cyclical practice of identifying - classifying - remediating - and mitigating vulnerabilities.
Vulnerability Management
Wi-Fi
human-based social engineering
Media Access Control (MAC)
49. A unique numerical string - created by a hashing algorithm on a given piece of data - used to verify data integrity. Generally hashes are used to verify the integrity of files after download (comparison to the hash value on the site before download)
hash
reverse social engineering
Buffer Overflow
Tiger Team
50. An Internet Protocol Security (IPSec) header used to verify that the contents of a packet have not been modified while the packet was in transit.
HTTP
Secure Multipurpose Mail Extension (S/MIME)
overt channel
Authentication Header (AH)
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests