SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A section or subset of the network. Often a router or other routing device provides the end point of the segment.
R
Contingency Plan
segment
Tumbling
2. A means of restricting access to system resources based on the sensitivity (as represented by a label) of the information contained in the system resource and the formal authorization (that is - clearance) of users to access information of such sensi
identity theft
routed protocol
Mandatory access control (MAC)
Password Authentication Protocol (PAP)
3. A method of evaluating the security of a computer system or network by simulating an attack from a malicious source.
penetration testing
Syslog
Open System Interconnection (OSI) Reference Model
Address Resolution Protocol (ARP) table
4. A malicious computer program with self-replication capabilities that attaches to another file and moves with the host from one computer to another.
802.11
404EE
risk
Virus
5. An HTTP command to transmit text to a web server for processing. The opposite of an HTTP GET.
POST
parallel scan & 75 sec timeout & 0.3 sec/probe
Virtual Private Network (VPN)
Daemon
6. Process of breaking a packet into smaller units when it is being transmitted over a network medium that's unable to support a transmission unit the original size of the packet.
-sS
footprinting
remote access
fragmentation
7. A computer virus that infects and spreads in multiple ways.
physical security
Multipartite virus
Interior Gateway Protocol (IGP)
stateful packet filtering
8. The monetary value assigned to an IT asset.
Information Technology (IT) asset valuation
-sP
ISO 17799
NOP
9. Window Scan
-sW
HTTP tunneling
public key
Lightweight Directory Access Protocol (LDAP)
10. Formal description and evaluation of the vulnerabilities in an information system
Detective Controls
rootkit
Vulnerability Assessment
hash
11. A piece of software - provided by the vendor - intended to update or fix known - discovered problems in a computer program or its supporting data.
patch
Cookie
Threat
suicide hacker
12. A self-replicating malicious program that attempts installation beneath antivirus software by directly intercepting the interrupt handlers of the operating system to evade detection.
null session
A procedure for identifying active hosts on a network.
Copyright
Tunneling Virus
13. The result of using a private key to encrypt a hash value for identification purposes within a PKI system. The signature can be decoded by the originator's public key - verifying his identity and providing non-repudiation. A valid digital signature g
NetBus
Digital Signature
Covert Channel
Virtual Private Network (VPN)
14. A domain composed of all the systems sharing any given physical transport media. Systems within a collision domain may collide with each other during the transmission of data. Collisions can be managed by CSMA/CD (collision detection) or CSMA/CA (col
piggybacking
Point-to-Point Protocol (PPP)
Collision Domain
Computer-Based Attack
15. A small Trojan program that listens on port 777.
Tini
local area network (LAN)
Domain Name System (DNS) cache poisoning
honeypot
16. Injecting traffic into the network to identify the operating system of a device.
Fast Ethernet
SSH
Active Fingerprinting
route
17. A type of encryption where the same key is used to encrypt and decrypt the message.
symmetric encryption
SNMP
Cryptography
audit
18. The concept of having more than one person required to complete a task
LDAP
Service Set Identifier (SSID)
separation of duties
gray hat
19. An evaluation conducted to determine the potential for damage to or loss of an IT asset.
signature scanning
remote procedure call (RPC)
risk assessment
DNS enumeration
20. UDP Scan
Ethernet
National Security Agency
-sU
fragmentation
21. SYN Ping
security incident response team (SIRT)
payload
International Organization for Standardization (ISO)
-PS
22. An inspection of a place where a company or individual proposes to work - to gather the necessary information for a design or risk assessment.
site survey
Tumbling
Cache
Point-to-Point Protocol (PPP)
23. CAN-SPAM
Defines legal email marketing
Simple Object Access Protocol (SOAP)
Zero Subnet
local area network (LAN)
24. A symmetric key cipher where plaintext bits are combined with a pseudo-random cipher bit stream (keystream) - typically by an exclusive-or (XOR) operation. In a stream cipher the plaintext digits are encrypted one at a time - and the transformation o
Asymmetric Algorithm
stream cipher
Wi-Fi Protected Access (WPA)
infrastructure mode
25. A comparison metric for different biometric devices and technologies; the point at which the false acceptance rate (FAR) equals the
Crossover Error Rate (CER)
shrink-wrap code attacks
Transport Layer Security (TLS)
firewall
26. A backlog of packets stored in buffers and waiting to be forwarded over an interface.
ring topology
ad hoc mode
queue
Fiber Distributed Data Interface (FDDI)
27. A step-by-step method of solving a problem. In computing security - an algorithm is a set of mathematical rules (logic) for the process of encryption and decryption
Digital Watermarking
Hacks without permission
Algorithm
Smurf attack
28. The monetary value expected from the occurrence of a risk on an asset. It is mathematically expressed as single loss expectancy (SLE) = asset value (AV)
SOA record
single loss expectancy (SLE)
HTTP tunneling
Request for Comments (RFC)
29. Describes practices in production and development that promote access to the end product's source materials.
risk transference
Wrapper
open source
Internet Assigned Number Authority (IANA)
30. A trusted entity that issues and revokes public key certificates. In a network - a CA is a trusted entity that issues - manages - and revokes security credentials and public keys for message encryption and/or authentication. Within a public key infra
Certificate Authority (CA)
operating system attack
Internet Protocol Security (IPSec) architecture
FTP
31. A symmetric - block-cipher data-encryption standard that uses a variablelength key that can range from 32 bits to 448 bits.
A procedure for identifying active hosts on a network.
Blowfish
passive attack
-oA
32. A TCP flag notifying an originating station that the preceding packet (or packets) has been received.
Zombie
Acknowledgment (ACK)
CNAME record
keylogger
33. The act of dialing all numbers within an organization to discover open modems.
-sA
War Dialing
Covert Channel
out-of-band signaling
34. A software or hardware application or device that captures user keystrokes.
keylogger
-sF
404EE
Tunnel
35. A software or hardware defect that often results in system vulnerabilities.
Bug
INFOSEC Assessment Methodology (IAM)
Virus
John the Ripper - LOphtcrack - Ophtcrack - Cain and Abel
36. A wireless access point that has either been installed on a secure company network without explicit authorization from a local network administrator - or has been created to allow a hacker to conduct a man-in-the-middle attack.
rogue access point
Kerberos
802.11
Information Technology Security Evaluation Criteria (ITSEC)
37. Controlling access to a network by analyzing the headers of incoming and outgoing packets - and letting them pass or discarding them based on rule sets created by a network administrator. A packet filter allows or denies packets based on destination
packet filtering
-sO
router
-PI
38. Port 88
Common Internet File System/Server Message Block
scope creep
keylogger
Kerberos
39. An international organization composed of national standards bodies from over 75 countries. Developed the OSI reference model.
File Allocation Table (FAT)
International Organization for Standardization (ISO)
SSH
gray box testing
40. Used for exchanging structured information - such as XML-based messages - in the implementation of web services
promiscuous mode
Possession of access devices
Simple Object Access Protocol (SOAP)
Defense in Depth
41. ex 02
S
-sF
intrusion prevention system (IPS)
Asymmetric
42. A method in cryptography by which cryptographic keys are exchanged between users - allowing use of a cryptographic algorithm (for example - the Diffie-Hellman key exchange).
key exchange protocol
Antivirus (AV) software
honeypot
Time exceeded
43. White hat
LDAP
Tini
Wi-Fi
Hacks with permission
44. A systematic process for the assessment of security vulnerabilities.
INFOSEC Assessment Methodology (IAM)
rootkit
Unicode
Crossover Error Rate (CER)
45. A penetration test in which the ethical hacker has limited knowledge of the intended target(s). Designed to simulate an internal - but non-systemadministrator-level attack.
File Transfer Protocol (FTP)
Boot Sector Virus
gray box testing
Traceroute
46. A network architecture framework developed by ISO that describes the communications process between two systems across the Internet in seven distinct layers.
POST
Open System Interconnection (OSI) Reference Model
Zone transfer
Network Basic Input/Output System (NetBIOS)
47. Another term for firewalking
Whois
port knocking
Malicious code
SOA record
48. Sneaky scan timing
Hacks without permission
serialize scans & 15 sec wait
Archive
INFOSEC Assessment Methodology (IAM)
49. Attacks on the actual programming code of an application.
protocol
Application-Level Attacks
Back orifice
War Dialing
50. A wireless networking mode where all clients connect to the wireless network through a central access point.
service level agreements (SLAs)
infrastructure mode
Dumpster Diving
inference attack