SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A biometric device that uses pattern-recognition techniques based on images of the irises of an individual's eyes.
iris scanner
John the Ripper - LOphtcrack - Ophtcrack - Cain and Abel
-P0
NT LAN Manager (NTLM)
2. Conversion of plaintext to ciphertext through the use of a cryptographic algorithm.
SAM
script kiddie
rule-based access control
encryption
3. An Ethernet networking system transmitting data at 100 million bits per second (Mbps) - 10 times the speed of an earlier Ethernet standard. Derived from the Ethernet 802.3 standard - it is also known as 100BaseT.
Videocipher II Satellite Encryption System
Hypertext Transfer Protocol (HTTP)
Access Point (AP)
Fast Ethernet
4. The ability to trace actions performed on a system to a specific user or system entity.
Accountability
Boot Sector Virus
Time exceeded
Routing Protocol
5. A sublayer of layer 2 of the OSI model - the Data Link layer. It provides addressing and channel access control mechanisms that enable several terminals or network nodes to communicate within a multipoint network.
Local Administrator
Multipartite virus
Block Cipher
Media Access Control (MAC)
6. Port 22
hybrid attack
Exploit
SSH
GET
7. Hex 29
Hacks without permission
U P F
Overwhelm CAM table to convert switch to hub mode
-P0
8. An evaluation consisting of a document review - interviews - and demonstrations. No hands-on testing is performed.
protocol
Level I assessment
social engineering
Methodology
9. TCP connect() scan
Institute of Electrical and Electronics Engineers (IEEE)
Media Access Control (MAC)
-sT
Internet Protocol (IP)
10. A pen testing method where the attacker knows all information about the internal network. It is designed to simulate an attack by a disgruntled systems administrator - or similar level.
Bluejacking
quantitative risk assessment
Wide Area Network (WAN)
White Box Testing
11. The rate at which a biometric system will incorrectly identify an unauthorized individual and allow them access (see false negative).
intrusion detection system (IDS)
Bluesnarfing
Finding a directory listing and gaining access to a parent or root file for access to other files
False Acceptance Rate (FAR)
12. Layer 6 of the OSI reference model. The Presentation layer ensures information sent by the Application layer of the sending system will be readable by the Application layer of the receiving system.
Bluesnarfing
Presentation layer
Zombie
risk acceptance
13. A network administration command-line tool available for many operating systems for querying the Domain Name System (DNS) to obtain domain name or IP address mappings or any other specific DNS record.
-sA
nslookup
net use \[target ip]IPC$ '' /user:''
hacktivism
14. All measures and techniques taken to gather information about an intended target. Footprinting can be passive or active.
Level I assessment
footprinting
Worm
protocol stack
15. A storage buffer that transparently stores data so future requests for the same data can be served faster.
serial scan & 300 sec wait
Cache
Echo request
NetBSD
16. A data encryption/decryption program often used for e-mail and file storage.
ISO 17799
fragmentation
Pretty Good Privacy (PGP)
network operations center (NOC)
17. TCP Ping
Data Encryption Standard (DES)
-PT
self encrypting
Warm Site
18. Controls to detect anomalies or undesirable events occurring on a system.
-sR
Whois
session splicing
Detective Controls
19. Black box test
Open System Interconnection (OSI) Reference Model
security kernel
Level I assessment
No previous knowledge of the network
20. A group of penetration testers that assess the security of an organization - which is often unaware of the existence of the team or the exact assignment.
suicide hacker
red team
Tunnel
DNS enumeration
21. A utility that sends an ICMP Echo message to determine if a specific IP address is accessible; if the message receives a reply - the address is reachable.
Trojan Horse
Network Basic Input/Output System (NetBIOS)
piggybacking
Packet Internet Groper (ping)
22. Window Scan
Internet service provider (ISP)
Wi-Fi
packet
-sW
23. Method used by antivirus software to detect new - unknown viruses that have not yet been identified; based on a piece-by-piece examination of a program - looking for a sequence or sequences of instructions that differentiate the virus from 'normal' p
heuristic scanning
Countermeasures
inference attack
Vulnerability
24. A string that represents the location of a web resource
Zenmap
MD5
-sP
Uniform Resource Locator (URL)
25. A formal set of rules describing data transmission - especially across a network. A protocol determines the type of error checking - the data compression method - how the sending device will indicate completion - how the receiving device will indicat
protocol
rule-based access control
DNS
Distributed DoS (DDoS)
26. 18 U.S.C. 1030
Black Box Testing
Fraud and related activity in connection with computers
payload
--randomize_hosts -O OS fingerprinting
27. A security protocol for wireless local area networks defined in the 802.11b standard; intended to provide the same level of security as a wired LAN. WEP is not considered strong security - although it does authenticate clients to access points - encr
hashing algorithm
flood
payload
Wired Equivalent Privacy (WEP)
28. A small space having two sets of interlocking doors; the first set of doors must close before the second set opens. Typically authentication is required for each door - often using different factors. For example - a smart card may open the first door
out-of-band signaling
Mantrap
spoofing
Packet Internet Groper (ping)
29. nmap
--randomize_hosts -O OS fingerprinting
Exploit
-PM
Network Address Translation (NAT)
30. A method of defining what rights and permissions an entity has to a given resource. In networking - Access Control Lists are commonly associated with firewall and router traffic filtering rules.
Competitive Intelligence
operating system attack
Access Control List (ACL)
Digital Signature
31. A stand-alone computer - kept off the network - that is used for scanning potentially malicious media or software.
War Dialing
Community String
Baseline
sheepdip
32. ICMP Type/Code 3
Destination Unreachable
Event
spam
Request for Comments (RFC)
33. The exploitation of a security vulnerability
Wrapper
A series of messages sent by someone attempting to break into a computer to learn about the computer's network services.
security breach or security incident
port scanning
34. Safeguards or countermeasures to avoid - counteract - or minimize security risks.
ECHO reply
MAC filtering
security controls
Collision
35. A self-replicating - self-propagating - self-contained program that uses networking mechanisms to spread itself.
Tunneling
risk
Droppers
Worm
36. The conveying of official access or legal power to a person or entity.
Authorization
suicide hacker
Internet Assigned Number Authority (IANA)
Written Authorization
37. The secret portion of an asymmetric key pair typically used to decrypt or digitally sign data. The private key is never shared and is always used for decryption - with one notable exception: The private key is used to encrypt the digital signature.
private key
-oX
Cache
Minimum acceptable level of risk
38. A protocol that uses a private key to encrypt data before transmitting confidential documents over the Internet; widely used on e-commerce - banking - and other sites requiring privacy.
intranet
proxy server
Secure Sockets Layer (SSL)
Three-Way (TCP) Handshake
39. An Application layer protocol for managing devices on an IP network.
Algorithm
Simple Network Management Protocol (SNMP)
Bluetooth
Transmission Control Protocol (TCP)
40. A protocol used to pass control and error messages between nodes on the Internet.
Adware
Authorization
Internet Control Message Protocol (ICMP)
Acceptable Use Policy (AUP)
41. Monitoring of telephone or Internet conversations - typically by covert means.
Wiretapping
Client
Information Technology (IT) asset valuation
Tunneling Virus
42. An evaluation consisting of a document review - interviews - and demonstrations - as well as vulnerability scans and hands-on testing.
Distributed DoS (DDoS)
Level II assessment
Sign in Seal
Covert Channel
43. An attack where the hacker positions himself between the client and the server - to intercept (and sometimes alter) data traveling between the two.
parallel scan & 75 sec timeout & 0.3 sec/probe
operating system attack
Man-in-the-middle attack
Level III assessment
44. A Canonical Name record within DNS - used to provide an alias for a domain name.
Asymmetric Algorithm
security breach or security incident
-oG
CNAME record
45. An attack that combines a brute-force attack with a dictionary attack.
Wireless Local Area Network (WLAN)
Network Basic Input/Output System (NetBIOS)
hybrid attack
human-based social engineering
46. A method of evaluating the security of a computer system or network by simulating an attack from a malicious source.
HTTP
Minimum acceptable level of risk
protocol
penetration testing
47. A distance-vector routing protocol that employs the hop count as a routing metric. The 'hold down time -' used to define how long a route is held in memory - is 180 seconds. RIP prevents routing loops by implementing a limit on the number of hops all
iris scanner
route
Internet Control Message Protocol (ICMP)
Routing Information Protocol (RIP)
48. A background process found in Unix - Linux - Solaris - and other Unix-based operating systems.
War Chalking
Temporal Key Integrity Protocol (TKIP)
Client
Daemon
49. A tool that helps a company to compare its actual performance with its potential performance.
non-repudiation
Biometrics
Cracker
gap analysis
50. An announcement - typically from a software vendor - of a known security vulnerability in a program; often the bulletin contains instructions for the application of a software patch.
security bulletins
Acknowledgment (ACK)
infrastructure mode
Internal access to the network
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests