SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A communications channel that is being used for a purpose it was not intended for - usually to transfer information secretly.
firewalking
security breach or security incident
Covert Channel
Network Address Translation (NAT)
2. Malware designed to install some sort of virus - backdoor - and so on - on a target system.
Master boot record infector
A R
Droppers
Audit Trail
3. An attack where the hacker manipulates parameters within the URL string in hopes of modifying data.
risk
Redundant Array of Independent Disks (RAID)
parameter tampering
stream cipher
4. An international encoding standard - working within multiple languages and scripts - that represents each letter - digit - or symbol with a unique numeric value that applies across different platforms.
Anonymizer
Unicode
parameter tampering
network access server
5. A skilled hacker that straddles the line between white hat (hacking only with permission and within guidelines) and black hat (malicious hacking for personal gain). Gray hats sometime perform illegal acts to exploit technology with the intent of achi
gray hat
Three-Way (TCP) Handshake
Tunneling Virus
Cryptographic Key
6. A type of DNS transfer - where all records from an SOA are transmitted to the requestor. Zone transfers have two options: full (opcode AXFR) and incremental (IXFR).
Copyright
promiscuous mode
Mandatory access control (MAC)
Zone transfer
7. Port 80/81/8080
CNAME record
CIA triangle
Authentication - Authorization - and Accounting (AAA)
HTTP
8. A network traffic management technique designed to allow applications to specify the route a packet will take to a destination - regardless of what the route tables between the two systems say.
Domain Name System (DNS) cache poisoning
null session
-PP
source routing
9. A list of IP addresses and corresponding MAC addresses stored on a local computer.
Address Resolution Protocol (ARP) table
Password Authentication Protocol (PAP)
Wiretapping
hot site
10. A means of restricting access to system resources based on the sensitivity (as represented by a label) of the information contained in the system resource and the formal authorization (that is - clearance) of users to access information of such sensi
Acceptable Use Policy (AUP)
User Datagram Protocol (UDP)
Mandatory access control (MAC)
gateway
11. A technology that establishes a tunnel to create a private - dedicated - leased-line network over the Internet. The data is encrypted so it's readable only by the sender and receiver. Companies commonly use VPNs to allow employees to connect securely
identity theft
Virtual Private Network (VPN)
non-repudiation
Back orifice
12. A communications protocol used for browsing the Internet.
Discretionary Access Control (DAC)
parallel scan
Hypertext Transfer Protocol (HTTP)
hot site
13. A unit of information formatted according to specific protocols that allows precise transmittal of data from one network node to another. Also called a datagram or data packet - a packet contains a header (container) and a payload (contents). Any IP
gray box testing
packet
INFOSEC Assessment Methodology (IAM)
Block Cipher
14. A step-by-step method of solving a problem. In computing security - an algorithm is a set of mathematical rules (logic) for the process of encryption and decryption
-PP
Time To Live (TTL)
Collision Domain
Algorithm
15. Phases of an attack
Tini
Reconnaissance - Scanning - Gaining Access - Maintaining Access - Covering Tracks
POST
encryption
16. A non-self-replicating program that appears to have a useful purpose - but in reality has a different - malicious purpose.
ECHO reply
Trojan Horse
Traceroute
-oN
17. Port 161/162
SNMP
Mandatory access control (MAC)
Detective Controls
Daemon
18. A penetration test in which the ethical hacker has limited knowledge of the intended target(s). Designed to simulate an internal - but non-systemadministrator-level attack.
Exploit
gray box testing
risk transference
Contingency Plan
19. An Application layer protocol - using TCP - for transporting files across an Internet connection. FTP transmits in clear text.
Data Encryption Standard (DES)
File Transfer Protocol (FTP)
FreeBSD
Overwhelm CAM table to convert switch to hub mode
20. A hacker who aims to bring down critical infrastructure for a 'cause' and does not worry about the penalties associated with his actions.
Antivirus (AV) software
suicide hacker
Back orifice
Console Port
21. Used for exchanging structured information - such as XML-based messages - in the implementation of web services
Discretionary Access Control (DAC)
Worm
Simple Object Access Protocol (SOAP)
quantitative risk assessment
22. A query and response protocol widely used for querying databases that store the registered users or assignees of an Internet resource - such as a domain name - an IP address - or an autonomous system.
Whois
Tunneling Virus
Information Technology (IT) asset valuation
Anonymizer
23. An Application layer protocol for managing devices on an IP network.
Database
-P0
qualitative analysis
Simple Network Management Protocol (SNMP)
24. A defined measure of service within a network system
Accountability
quality of service (QoS)
Information Technology (IT) security architecture and framework
Mandatory access control (MAC)
25. Hashing algorithm that results in a 128-bit output.
MD5
Zenmap
A S
--randomize_hosts -O OS fingerprinting
26. An application that monitors a computer or network to identify - and prevent - malware. AV is usually signature-based - and can take multiple actions on defined malware files/activity.
Echo Reply
Syslog
Antivirus (AV) software
Fraud and related activity in connection with computers
27. Whether purposeful or the result of malware or other attack - a backdoor is a hidden capability in a system or program for bypassing normal computer authentication systems.
Data Link layer
Backdoor
reconnaissance
Cryptographic Key
28. A denial-of-service technique that uses numerous hosts to perform the attack.
public key
ping sweep
Backdoor
Distributed DoS (DDoS)
29. The process of using easily accessible DNS records to map a target network's internal hosts.
Telnet
Ciphertext
Active Attack
DNS enumeration
30. ICMP Type/Code 3
-sS
War Dialing
Destination Unreachable
hacktivism
31. A Windows-based GUI version of nmap.
INFOSEC Assessment Methodology (IAM)
Zenmap
intrusion detection system (IDS)
SAM
32. A computer process that requests a service from another computer and accepts the server's responses.
Macro virus
Client
Wiretapping
Malware
33. An attack that combines a brute-force attack with a dictionary attack.
hybrid attack
Fiber Distributed Data Interface (FDDI)
Network Address Translation (NAT)
International Organization for Standardization (ISO)
34. A system used by the Securities and Exchange Commission (SEC) for companies and businesses to transmit required filings and information. The EDGAR database performs automated collection - validation - indexing - acceptance - and forwarding of submiss
EDGAR database
Annualized Loss Expectancy (ALE)
National Security Agency
RxBoot
35. A stand-alone computer - kept off the network - that is used for scanning potentially malicious media or software.
sheepdip
out-of-band signaling
Droppers
Internet service provider (ISP)
36. An information assurance strategy in which multiple layers of defense are placed throughout an Information Technology system.
Uniform Resource Locator (URL)
Defense in Depth
Back orifice
Last In First Out (LIFO)
37. A self-replicating - self-propagating - self-contained program that uses networking mechanisms to spread itself.
key exchange protocol
Worm
node
Active Directory (AD)
38. Physical socket provided on routers and switches for cable connections between a computer and the router/switch. This connection enables the computer to configure - query - and troubleshoot the router/switch by use of a terminal emulator and a comman
false rejection rate (FRR)
Console Port
-sS
Level I assessment
39. A NAT method in which multiple internal hosts - using private IP addressing - can be mapped through a single public IP address using the session IDs and port numbers. An internal global IP address can support in excess of 65 -000 concurrent TCP and U
Port Address Translation (PAT)
spam
802.11
Internet Control Message Protocol (ICMP)
40. A cyber attacker who acts without permission from - and gives prior notice to - the resource owner. Also known as a malicious hacker.
SNMP
Cracker
FTP
ad hoc mode
41. A device providing temporary - on-demand - point-to-point network access to users.
Exposure Factor
-sO
Cache
network access server
42. A simple PPP authentication mechanism in which the user name and password are transmitted in clear text to prove identity. PAP compares the user name and password to a table listing authorized users.
Information Technology (IT) security architecture and framework
Client
Password Authentication Protocol (PAP)
Data Link layer
43. Two or more LANs connected by a high-speed line across a large geographical area.
Authentication Header (AH)
Wide Area Network (WAN)
stateful packet filtering
Computer Emergency Response Team (CERT)
44. The monetary value expected from the occurrence of a risk on an asset. It is mathematically expressed as single loss expectancy (SLE) = asset value (AV)
Availability
Backdoor
security kernel
single loss expectancy (SLE)
45. A free - open source version of the Berkeley Software Distribution of Unix - often used in embedded systems.
Media Access Control (MAC)
false negative
NetBSD
single loss expectancy (SLE)
46. The basis of this kind of security is that an individual user - or program operating on the user's behalf - is allowed to specify explicitly the types of access other users (or programs executing on their behalf) may have to information under the use
Discretionary Access Control (DAC)
Directory Traversal
EDGAR database
intrusion detection system (IDS)
47. A string used for authentication in SNMP. The public community string is used for read-only searches - whereas the private community string is used for read/write. Community strings are transmitted in clear text in SNMPv1. SNMPv3 provides encryption
Hypertext Transfer Protocol Secure (HTTPS)
Community String
Simple Object Access Protocol (SOAP)
MD5
48. An unknown deficiency in software or some other product that results in a security vulnerability being identified.
reverse lookup; reverse DNS lookup
security defect
sidejacking
-sA
49. A standard developed to enable routers to exchange messages containing information about routes to reach subnets in the network.
local area network (LAN)
Routing Protocol
Post Office Protocol 3 (POP3)
Real application encompassing Trojan
50. The organization that governs the Internet's top-level domains - IP address allocation - and port number assignments.
Assessment
impersonation
Internet Assigned Number Authority (IANA)
Biometrics