SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Looking over an authorized user's shoulder in order to steal information (such as authentication information).
Tumbling
shoulder surfing
Post Office Protocol 3 (POP3)
Common Internet File System/Server Message Block
2. A connectionless - layer 4 transport protocol. UDP is faster than TCP - but offers no reliability. A best effort is made to deliver the data - but no checks and verifications are performed to guarantee delivery. Therefore - UDP is termed a 'connectio
Tunneling Virus
User Datagram Protocol (UDP)
Defines legal email marketing
intrusion detection system (IDS)
3. An Internet Protocol Security (IPSec) header used to verify that the contents of a packet have not been modified while the packet was in transit.
Authentication Header (AH)
router
Console Port
promiscuous mode
4. A secret - typically consisting of only decimal digits - that a claimant memorizes and uses to authenticate his identity
Decryption
Information Technology (IT) asset valuation
null session
personal identification number (PIN)
5. Computer software or hardware that can intercept and log traffic passing over a digital network.
Computer-Based Attack
node
-b
sniffer
6. Occurs when authorized users accumulate excess privileges on a system due to moving from position to position.
Access Creep
Pretty Good Privacy (PGP)
qualitative analysis
session splicing
7. A protocol used to pass control and error messages between nodes on the Internet.
Internet Control Message Protocol (ICMP)
penetration testing
Community String
Information Technology Security Evaluation Criteria (ITSEC)
8. Two or more LANs connected by a high-speed line across a large geographical area.
hashing algorithm
Competitive Intelligence
Wide Area Network (WAN)
security defect
9. An API that provides services related to the OSI model's Session layer - allowing applications on separate computers to communicate over a LAN.
Hacks with permission
NetBSD
false rejection rate (FRR)
Network Basic Input/Output System (NetBIOS)
10. Hashing algorithm that results in a 128-bit output.
MD5
Auditing
risk avoidance
serialize scans & 15 sec wait
11. A social-engineering attack that manipulates the victim into calling the attacker for help.
Virtual Local Area Network (VLAN)
reverse social engineering
HIDS
Point-to-Point Protocol (PPP)
12. Establish Null Session
Wired Equivalent Privacy (WEP)
qualitative analysis
Possession of access devices
net use \[target ip]IPC$ '' /user:''
13. The subjective - potential percentage of loss to a specific asset if a specific threat is realized. The exposure factor (EF) is a subjective value the person assessing risk must define.
social engineering
Exposure Factor
Transmission Control Protocol (TCP)
polymorphic virus
14. Steps taken to identify and limit risks to an acceptable or reasonable level of exposure.
Due Diligence
Finger
session hijacking
Brute-Force Password Attack
15. Software code - a portion of data - or sequence of commands intended to take advantage of a bug or vulnerability in order to cause unintended or unanticipated behavior to occur on computer software or hardware.
Audit Data
Exploit
sniffer
signature scanning
16. A fully qualified domain name consists of a host and domain name - including a top-level domain such as .com - .net - .mil - .edu -and so on.
Brute-Force Password Attack
net use \[target ip]IPC$ '' /user:''
-sV
fully qualified domain name (FQDN)
17. Port 135
Real application encompassing Trojan
Last In First Out (LIFO)
Presentation layer
RPC-DCOM
18. 18 U.S.C. 1029
Possession of access devices
FTP
gray box testing
SOA record
19. A widely used authentication protocol developed at the MassachusettsInstitute of Technology (MIT). Kerberos authentication uses tickets - Ticket Granting Service - and Key Distribution Center.
Kerberos
Fraud and related activity in connection with computers
Common Internet File System/Server Message Block
intrusion prevention system (IPS)
20. The process of pinging each address within a subnet to map potential targets. Ping sweeps are unreliable and easily detectable - but very fast.
ping sweep
Wired Equivalent Privacy (WEP)
packet filtering
National Security Agency
21. Microsoft SID 500
Daisy Chaining
Local Administrator
Collision
qualitative analysis
22. The basis of this kind of security is that an individual user - or program operating on the user's behalf - is allowed to specify explicitly the types of access other users (or programs executing on their behalf) may have to information under the use
segment
Discretionary Access Control (DAC)
ISO 17799
packet filtering
23. Any network incident that prompts some kind of log entry or other notification.
Exposure Factor
Blowfish
Event
Last In First Out (LIFO)
24. A means of restricting access to system resources based on the sensitivity (as represented by a label) of the information contained in the system resource and the formal authorization (that is - clearance) of users to access information of such sensi
Fiber Distributed Data Interface (FDDI)
Mandatory access control (MAC)
Internet Protocol Security (IPSec) architecture
Level II assessment
25. A denial-of-service attack where the attacker sends a ping to the network's broadcast address from the spoofed IP address of the target. All systems in the subnet then respond to the spoofed address - eventually flooding the device.
Domain Name
Internal access to the network
Internet Assigned Number Authority (IANA)
Smurf attack
26. Originally an extension of PPP - this is a protocol for authentication used within wireless networks. Works with multiple authentication measures.
Extensible Authentication Protocol (EAP)
Routing Information Protocol (RIP)
Algorithm
router
27. Freely and readily available information on an organization that can be gathered by a business entity about its competitor's customers - products - and marketing - and can be used by an attacker to build useful information for further attacks.
Bluejacking
rootkit
Active Attack
Competitive Intelligence
28. The lack of clocking (imposed time ordering) on a bit stream.
Asynchronous
enumeration
Trusted Computer System Evaluation Criteria (TCSEC)
Adware
29. The act of using numerous electronic serial numbers on a cell phone until a valid number is located.
-sX
Blowfish
Tumbling
Secure Multipurpose Mail Extension (S/MIME)
30. A computer security expert who performs security audits and penetration tests against systems or network segments - with the owner's full knowledge and permission - in an effort to increase security.
-oG
Hacks without permission
Due Care
Ethical Hacker
31. A suite of protocols used for securing Internet Protocol (IP) communications by authenticating and encrypting each IP packet of a communication session. This suite includes protocols for establishing mutual authentication between agents at the sessio
Internet Protocol Security (IPSec) architecture
secure channel
Administratively Prohibited
Simple Mail Transfer Protocol (SMTP)
32. A network architecture framework developed by ISO that describes the communications process between two systems across the Internet in seven distinct layers.
port scanning
SYN attack
Open System Interconnection (OSI) Reference Model
source routing
33. An attack that combines a brute-force attack with a dictionary attack.
hybrid attack
ad hoc mode
Brute-Force Password Attack
firewall
34. Used for exchanging structured information - such as XML-based messages - in the implementation of web services
Simple Object Access Protocol (SOAP)
Unicode
Port Address Translation (PAT)
flood
35. A device that receives and sends data packets between two or more networks; the packet headers and a forwarding table provide the router with the information necessary for deciding which interface to use to forward packets.
SAM
router
SOA record
Buffer
36. FIN Scan
Back orifice
Minimum acceptable level of risk
Computer Emergency Response Team (CERT)
-sF
37. Confidentiality - Integrity - and Availability are the three aspects of security and make up the triangle.
Syslog
A S
CIA triangle
Anonymizer
38. PI and PT Ping
Electronic Code Book (ECB)
-PB
Target Of Engagement (TOE)
Console Port
39. A hacking method for stealing the cookies used during a session build and replaying them for unauthorized connection purposes.
sidejacking
ISO 17799
Bastion host
SID
40. TCP connect() scan
Wireless Local Area Network (WLAN)
-sT
protocol stack
DNS
41. Any kind of connection that allows you to see all traffic passing by. Generally used in reference to a NIDS (network-based IDS) to monitor all traffic.
Detective Controls
Database
network tap
Time Bomb
42. The organization that governs the Internet's top-level domains - IP address allocation - and port number assignments.
Real application encompassing Trojan
Bluesnarfing
Internet Assigned Number Authority (IANA)
Decryption
43. Policy stating what users of a system can and cannot do with the organization's assets.
Acceptable Use Policy (AUP)
fragmentation
nslookup
hacktivism
44. Access by information systems (or users) communicating from outside the information system security perimeter.
out-of-band signaling
Authentication Header (AH)
risk acceptance
remote access
45. An early network application that provides information on users currently logged on to a machine.
Finger
SYN flood attack
Secure Sockets Layer (SSL)
Common Internet File System/Server Message Block
46. A standard for encrypting e-mail - web pages - and other stream-oriented information transmitted over the Internet.
Authentication - Authorization - and Accounting (AAA)
footprinting
Transport Layer Security (TLS)
Level I assessment
47. A symmetric key cipher where plaintext bits are combined with a pseudo-random cipher bit stream (keystream) - typically by an exclusive-or (XOR) operation. In a stream cipher the plaintext digits are encrypted one at a time - and the transformation o
stream cipher
Sign in Seal
serialize scans & 15 sec wait
Tumbling
48. White box test
Redundant Array of Independent Disks (RAID)
Covert Channel
Internal access to the network
port knocking
49. The act of searching for Wi-Fi wireless networks by a person in a moving vehicle - using a portable device.
Detective Controls
Institute of Electrical and Electronics Engineers (IEEE)
Banner Grabbing
War Driving
50. LM Hash for short passwords (under 7)
404EE
Active Fingerprinting
Written Authorization
hardware keystroke logger
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests