SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A software program for remotely controlling a Microsoft Windows computer system over a network. Generally considered malware.
Wireless Local Area Network (WLAN)
Availability
parallel scan & 300 sec timeout & 1.25 sec/probe
NetBus
2. The act of checking some sequence of tokens for the presence of the constituents of some pattern.
Simple Object Access Protocol (SOAP)
pattern matching
False Acceptance Rate (FAR)
Brute-Force Password Attack
3. A defined measure of service within a network system
MAC filtering
Password Authentication Protocol (PAP)
quality of service (QoS)
Asset
4. A method in cryptography by which cryptographic keys are exchanged between users - allowing use of a cryptographic algorithm (for example - the Diffie-Hellman key exchange).
key exchange protocol
Demilitarized Zone (DMZ)
ring topology
Macro virus
5. Port 135
-PB
Address Resolution Protocol (ARP)
RPC-DCOM
-PP
6. A network system of servers that translates numeric Internet Protocol (IP) addresses into human-friendly - hierarchical Internet addresses - and vice versa.
sniffer
Active Fingerprinting
SSH
Domain Name System (DNS)
7. A string that represents the location of a web resource
Uniform Resource Locator (URL)
Discretionary Access Control (DAC)
-sX
qualitative analysis
8. A person or entity indirectly involved in a relationship between two principles.
-b
Third Party
Smurf attack
forwarding
9. The default network authentication suite of protocols for Windows NT 4.0
NT LAN Manager (NTLM)
Cache
The automated process of proactively identifying vulnerabilities of computing systems present in a network
TACACS
10. CAN-SPAM
security incident response team (SIRT)
Defines legal email marketing
Directory Traversal
CNAME record
11. Cracking Tools
SAM
Trapdoor Function
John the Ripper - LOphtcrack - Ophtcrack - Cain and Abel
overt channel
12. A term trademarked by the Wi-Fi Alliance - used to define a standard for devices to use to connect to a wireless network.
encapsulation
Wi-Fi
self encrypting
net use \[target ip]IPC$ '' /user:''
13. A software or hardware application or device that captures user keystrokes.
net use \[target ip]IPC$ '' /user:''
keylogger
-sV
Due Diligence
14. Aggressive scan timing
File Transfer Protocol (FTP)
End User Licensing Agreement (EULA)
parallel scan & 300 sec timeout & 1.25 sec/probe
Simple Mail Transfer Protocol (SMTP)
15. A formal set of rules describing data transmission - especially across a network. A protocol determines the type of error checking - the data compression method - how the sending device will indicate completion - how the receiving device will indicat
Internet Assigned Number Authority (IANA)
protocol
flood
site survey
16. A domain composed of all the systems sharing any given physical transport media. Systems within a collision domain may collide with each other during the transmission of data. Collisions can be managed by CSMA/CD (collision detection) or CSMA/CA (col
Collision Domain
Discretionary Access Control (DAC)
-sR
-sI
17. Xmas Tree scan
-sX
Level I assessment
Last In First Out (LIFO)
-sP
18. The organization that governs the Internet's top-level domains - IP address allocation - and port number assignments.
Internet Assigned Number Authority (IANA)
spam
Threat
-sP
19. A record showing which user has accessed a given resource and what operations the user performed during a given period.
security incident response team (SIRT)
Cryptography
Audit Trail
key exchange protocol
20. Sending unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobile phones - PDAs - or laptop computers.
Trusted Computer Base (TCB)
Bluejacking
identity theft
hot site
21. Access by information systems (or users) communicating from outside the information system security perimeter.
SYN flood attack
remote access
Exposure Factor
hardware keystroke logger
22. Recording the time - normally in a log file - when an event happens or when information is created or modified.
-sV
-sT
Internet service provider (ISP)
Timestamping
23. A computer network confined to a relatively small area - such as a single building or campus.
local area network (LAN)
network interface card (NIC)
limitation of liability and remedies
Vulnerability Assessment
24. A well-known and studied phenomenon of human nature - whereby a single trait influences the perception of other traits.
halo effect
replay attack
Exposure Factor
Transmission Control Protocol (TCP)
25. Used to find the domain name associated with an IP address; the opposite of a DNS lookup.
reverse lookup; reverse DNS lookup
Warm Site
queue
A series of messages sent by someone attempting to break into a computer to learn about the computer's network services.
26. A method of external testing whereby several systems or resources are used together to effect an attack.
shrink-wrap code attacks
serial scan & 300 sec wait
Daisy Chaining
public key infrastructure (PKI)
27. A cyber attacker who acts without permission from - and gives prior notice to - the resource owner. Also known as a malicious hacker.
Black Box Testing
hot site
-sS
Cracker
28. Layer 6 of the OSI reference model. The Presentation layer ensures information sent by the Application layer of the sending system will be readable by the Application layer of the receiving system.
Presentation layer
Console Port
hashing algorithm
-oA
29. A computer file system architecture used in Windows - OS/2 - and most memory cards.
Time To Live (TTL)
iris scanner
File Allocation Table (FAT)
Institute of Electrical and Electronics Engineers (IEEE)
30. An attack in which the hacker can derive information from the ciphertext without actually decoding it. Sensitive information can be considered compromised if an adversary can infer its real value with a high level of confidence.
Authorization
GET
Institute of Electrical and Electronics Engineers (IEEE)
inference attack
31. A networking configuration where all nodes are connected in a circle with no terminated ends on the cable.
ring topology
Fiber Distributed Data Interface (FDDI)
firewalking
-sP
32. Unauthorized access to information such as a calendar - contact list - e-mails - and text messages on a wireless device through a Bluetooth connection.
open source
Bluesnarfing
Trojan Horse
Digital Watermarking
33. An Internet routing protocol used to exchange routing information within an autonomous system.
Interior Gateway Protocol (IGP)
U P F
Trusted Computer System Evaluation Criteria (TCSEC)
Vulnerability Assessment
34. The cyclical practice of identifying - classifying - remediating - and mitigating vulnerabilities.
Written Authorization
Domain Name System (DNS) lookup
802.11
Vulnerability Management
35. NSA
Wide Area Network (WAN)
Active Attack
National Security Agency
POST
36. A method of password cracking whereby all possible options are systematically enumerated until a match is found. These attacks try every password (or authentication option) - one after another - until successful. Bruteforce attacks take a long time t
Brute-Force Password Attack
Asynchronous
Point-to-Point Protocol (PPP)
Transmission Control Protocol (TCP)
37. Nmap grepable output
scope creep
separation of duties
passive attack
-oG
38. Wireless LAN standards created by IEEE. 802.11a runs at up to 54Mbps at 5GHz - 802.11b runs at 11Mbps at 2.4GHz - 802.11g runs at 54Mbps at 2.4GHz - and 802.11n can run upwards of 150MBps.
802.11
Active Directory (AD)
Level I assessment
-PS
39. A mathematical operation requiring two binary inputs: If the inputs match - the output is a 0 - otherwise it is a 1.
Acceptable Use Policy (AUP)
XOR Operation
POP 3
Replacing numbers in a url to access other files
40. A fully qualified domain name consists of a host and domain name - including a top-level domain such as .com - .net - .mil - .edu -and so on.
parallel scan & 300 sec timeout & 1.25 sec/probe
Competitive Intelligence
HTTP
fully qualified domain name (FQDN)
41. A storage buffer that transparently stores data so future requests for the same data can be served faster.
Cache
phishing
Fraud and related activity in connection with computers
ECHO reply
42. ex 02
Crossover Error Rate (CER)
NT LAN Manager (NTLM)
GET
S
43. Window Scan
node
-sW
FreeBSD
Antivirus (AV) software
44. Sneaky scan timing
serialize scans & 15 sec wait
Information Technology Security Evaluation Criteria (ITSEC)
intrusion detection system (IDS)
-sW
45. A programming principle whereby the last piece of data added to the stack is the first piece of data taken off.
Level I assessment
proxy server
Last In First Out (LIFO)
symmetric algorithm
46. Calculations of two components of risk: R - the magnitude of the potential loss (L) - and the probability - p - that the loss will occur.
Media Access Control (MAC)
quantitative risk assessment
sheepdip
EDGAR database
47. A connectionless - layer 4 transport protocol. UDP is faster than TCP - but offers no reliability. A best effort is made to deliver the data - but no checks and verifications are performed to guarantee delivery. Therefore - UDP is termed a 'connectio
Acknowledgment (ACK)
risk transference
User Datagram Protocol (UDP)
Google hacking
48. Port 88
SOA record
Information Technology Security Evaluation Criteria (ITSEC)
RPC-DCOM
Kerberos
49. An authentication method on point-to-point links - using a three-way handshake and a mutually agreed-upon key.
NetBus
Replacing numbers in a url to access other files
inference attack
Challenge Handshake Authentication Protocol (CHAP)
50. A limit on the amount of time or number of iterations or transmissions in computer and network technology a packet can experience before it will be discarded.
footprinting
Time To Live (TTL)
Anonymizer
operating system attack
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests