SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Describes practices in production and development that promote access to the end product's source materials.
open source
gateway
self encrypting
remote procedure call (RPC)
2. A small space having two sets of interlocking doors; the first set of doors must close before the second set opens. Typically authentication is required for each door - often using different factors. For example - a smart card may open the first door
Mantrap
hash
Electronic serial number
Hierarchical File System (HFS)
3. A pen testing method where the attacker knows all information about the internal network. It is designed to simulate an attack by a disgruntled systems administrator - or similar level.
port redirection
spyware
File Transfer Protocol (FTP)
White Box Testing
4. A type 0 ICMP message used to reply to ECHO requests. Used with ping to verify network layer connectivity between hosts.
ECHO reply
passive attack
-P0
Archive
5. A derogatory term used to describe an attacker - usually new to the field - who uses simple - easy-to-follow scripts or programs developed by others to attack computer systems and networks and deface websites.
-sS
Decryption
script kiddie
Asymmetric Algorithm
6. A limited-function version of the Internetworking Operating System (IOS) - held in read-only memory in some earlier models of Cisco devices - capable of performing several seldom-needed low-level functions such as loading a new IOS into Flash memory
encryption
Application-Level Attacks
Finding a directory listing and gaining access to a parent or root file for access to other files
RxBoot
7. A class of algorithms for cryptography that use the same cryptographic key for both decryption and encryption.
Data Encryption Standard (DES)
Bastion host
symmetric algorithm
POP 3
8. Software that has advertisements embedded within. Generally displays ads in the form of pop-ups.
Black Hat
A series of messages sent by someone attempting to break into a computer to learn about the computer's network services.
Cryptographic Key
Adware
9. A defined measure of service within a network system
quality of service (QoS)
Virus
encapsulation
piggybacking
10. Sneaky scan timing
Internet Protocol Security (IPSec) architecture
White Box Testing
serialize scans & 15 sec wait
A R
11. ICMP Type/Code 3
Destination Unreachable
Pretty Good Privacy (PGP)
Transmission Control Protocol (TCP)
node
12. The process of transforming ciphertext into plaintext through the use of a cryptographic algorithm.
Decryption
network access server
-sU
Acknowledgment (ACK)
13. ICMP Timestamp
Level II assessment
Time To Live (TTL)
-PP
-sU
14. Access by information systems (or users) communicating from outside the information system security perimeter.
footprinting
-PI
remote access
security incident response team (SIRT)
15. A person or entity indirectly involved in a relationship between two principles.
self encrypting
NetBSD
Third Party
User Datagram Protocol (UDP)
16. Baseband LAN specification developed by Xerox Corporation - Intel - and Digital Equipment Corporation. One of the least expensive - most widely deployed networking standards; uses the CSMA/CD method of media access control.
Vulnerability Management
CNAME record
Ethernet
heuristic scanning
17. Text or data in its encrypted form; the result of plaintext being input into a cryptographic algorithm.
Possession of access devices
Ciphertext
identity theft
Due Diligence
18. The organization that governs the Internet's top-level domains - IP address allocation - and port number assignments.
polymorphic virus
encapsulation
Internet Assigned Number Authority (IANA)
Due Diligence
19. A background process found in Unix - Linux - Solaris - and other Unix-based operating systems.
Daemon
fully qualified domain name (FQDN)
remote procedure call (RPC)
-sS
20. A connection-oriented - layer 4 protocol for transporting data over network segments. TCP is considered reliable because it guarantees delivery and the proper reordering of transmitted packets. This protocol is used for most long-haul traffic on the
Virtual Local Area Network (VLAN)
security controls
Transmission Control Protocol (TCP)
Virus Hoax
21. A protocol defining packets that are able to be routed by a router.
War Chalking
A procedure for identifying active hosts on a network.
routed protocol
Defense in Depth
22. Metamorphic Virus
Self Replicating
SNMP
Address Resolution Protocol (ARP)
Digital Watermarking
23. nmap all output
Certificate
--randomize_hosts -O OS fingerprinting
suicide hacker
-oA
24. A method of falsely identifying the source of data packets; often used by hackers to make it difficult to trace where an attack originated.
Post Office Protocol 3 (POP3)
heuristic scanning
risk acceptance
spoofing
25. A text file stored within a browser by a web server that maintains information about the connection. Cookies are used to store information to maintain a unique but consistent surfing experience - but can also contain authentication parameters. Cookie
patch
port redirection
Cookie
session hijacking
26. Software code - a portion of data - or sequence of commands intended to take advantage of a bug or vulnerability in order to cause unintended or unanticipated behavior to occur on computer software or hardware.
Address Resolution Protocol (ARP) table
proxy server
Exploit
Replacing numbers in a url to access other files
27. The exploitation of a security vulnerability
Time Bomb
Simple Object Access Protocol (SOAP)
404EE
security breach or security incident
28. Port 161/162
Telnet
-sT
SNMP
payload
29. A list of IP addresses and corresponding MAC addresses stored on a local computer.
Network Address Translation (NAT)
Information Technology (IT) infrastructure
Address Resolution Protocol (ARP) table
Smurf attack
30. CAN-SPAM
limitation of liability and remedies
Defines legal email marketing
Level II assessment
protocol
31. A NAT method in which multiple internal hosts - using private IP addressing - can be mapped through a single public IP address using the session IDs and port numbers. An internal global IP address can support in excess of 65 -000 concurrent TCP and U
Worm
Active Fingerprinting
serialize scans & 0.4 sec wait
Port Address Translation (PAT)
32. A cell phone attack in which the serial number from one cell phone is copied to another in an effort to copy the cell phone.
Cloning
Hacks without permission
risk assessment
Vulnerability Management
33. A computer placed outside a firewall to provide public services to other Internet sites - and hardened to resist external attacks.
encryption
logic bomb
Bastion host
802.11
34. Terminal Access Controller Access-Control System. A remote authentication protocol that is used to communicate with an authentication server commonly used in Unix networks.
Eavesdropping
ring topology
Address Resolution Protocol (ARP)
TACACS
35. The act or actions of a hacker to put forward a cause or a political agenda - to affect some societal change - or to shed light on something he feels to be political injustice. These activities are usually illegal in nature.
hacktivism
private network address
Syslog
Denial of Service (DoS)
36. Provides router-to-router or host-to-network connections over asynchronous and synchronous circuits.
Transmission Control Protocol (TCP)
Point-to-Point Protocol (PPP)
honeynet
Sign in Seal
37. A string that represents the location of a web resource
Echo request
Replacing numbers in a url to access other files
Uniform Resource Locator (URL)
Information Technology (IT) asset criticality
38. The conveying of official access or legal power to a person or entity.
Authorization
hybrid attack
Event
spyware
39. A group of people - gathered together by a business entity - working to address a specific problem or goal.
Tiger Team
-sF
Bluetooth
File Transfer Protocol (FTP)
40. A software or hardware application or device that captures user keystrokes.
service level agreements (SLAs)
heuristic scanning
keylogger
Bug
41. An extensible mechanism for e-mail. A variety of MIME types exist for sending content such as audio - binary - or video using the Simple Mail Transfer Protocol (SMTP).
Application Layer
Daisy Chaining
Multipurpose Internet Mail Extensions (MIME)
spyware
42. The process of attaching a particular protocol header and trailer to a unit of data before transmission on the network. Occurs at layer 2 of the OSI reference model.
separation of duties
Wi-Fi Protected Access (WPA)
encapsulation
symmetric algorithm
43. Aggressive scan timing
-sR
ISO 17799
parallel scan & 300 sec timeout & 1.25 sec/probe
Digital Watermarking
44. A principle in security engineering that attempts to use anonymity and secrecy (of design - implementation - and so on) to provide security; the footprint of the organization - entity - network - or system is kept as small as possible to avoid intere
TACACS
security by obscurity
NOP
Ethical Hacker
45. Traffic-passing technique used by bridges and switches in which traffic received on an interface is sent out all interfaces on the device except the interface on which the information was originally received. Traffic on a switch is flooded when it is
Availability
flood
No previous knowledge of the network
SSH
46. A decision to reduce the potential for damage to or loss of an IT asset by taking some type of action
Time exceeded
Wide Area Network (WAN)
risk avoidance
Brute-Force Password Attack
47. A network system of servers that translates numeric Internet Protocol (IP) addresses into human-friendly - hierarchical Internet addresses - and vice versa.
Domain Name System (DNS)
SAM
A R
Internet Protocol (IP)
48. Occurs when authorized users accumulate excess privileges on a system due to moving from position to position.
Contingency Plan
Covert Channel
Access Creep
false rejection rate (FRR)
49. The result of using a private key to encrypt a hash value for identification purposes within a PKI system. The signature can be decoded by the originator's public key - verifying his identity and providing non-repudiation. A valid digital signature g
security bulletins
Digital Signature
Archive
-sS
50. Actions - devices - procedures - techniques - or other measures intended to reduce the vulnerability of an information system.
Ethical Hacker
Cracker
Countermeasures
Fast Ethernet