SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A protocol for transporting data packets across a packet switched internetwork (such as the Internet). IP is a routed protocol.
End User Licensing Agreement (EULA)
Bluejacking
Daemon
Internet Protocol (IP)
2. A unique hostname that is used to identify resources on the Internet. Domain names start with a root (.) - then add a top level (.com - .gov - or .mil - for example) - and a given name space.
NetBSD
Domain Name
sidejacking
heuristic scanning
3. A program designed to execute at a specific time to release malicious code onto the computer system or network.
-p <port ranges>
Tunneling
Time Bomb
enumeration
4. The transmission of digital signals without precise clocking or synchronization.
Worm
sidejacking
stream cipher
asynchronous transmission
5. A query and response protocol widely used for querying databases that store the registered users or assignees of an Internet resource - such as a domain name - an IP address - or an autonomous system.
Malicious code
Whois
NetBSD
Macro virus
6. Using conversation or some other interaction between people to gather useful information.
signature scanning
route
human-based social engineering
Local Administrator
7. A hybrid of the HTTP and SSL/TLS protocols that provides encrypted communication and secure identification of a web server.
Countermeasures
Archive
Hypertext Transfer Protocol Secure (HTTPS)
Wi-Fi
8. A point-to-point connection between two endpoints created to exchangedata. Typically a tunnel is either an encrypted connection - or a connection using a protocol in a method for which it was not designed. An encrypted connection forms a point-to-poi
Tunnel
asynchronous transmission
Telnet
gray box testing
9. A record showing which user has accessed a given resource and what operations the user performed during a given period.
Audit Trail
Client
false rejection rate (FRR)
asynchronous transmission
10. A device providing temporary - on-demand - point-to-point network access to users.
Kerberos
local area network (LAN)
network access server
Hypertext Transfer Protocol (HTTP)
11. An attack in which the hacker can derive information from the ciphertext without actually decoding it. Sensitive information can be considered compromised if an adversary can infer its real value with a high level of confidence.
inference attack
network interface card (NIC)
False Acceptance Rate (FAR)
Client
12. Devices - connected to one or more switches - grouped logically into a single broadcast domain. VLANs enable administrators to divide the devices connected to the switches into multiple VLANs without requiring separate physical switches.
network interface card (NIC)
Biometrics
Malicious code
Virtual Local Area Network (VLAN)
13. Start of Authority record. This record identifies the primary name server for the zone. The SOA record contains the host name of the server responsible for all DNS records within the namespace - as well as the basic properties of the domain.
gap analysis
Threat
Virus
SOA record
14. Also known as the dot-dot-slash attack. Using directory traversal - the attacker attempts to access restricted directories and execute commands outside intended web server directories by using the URL to redirect to an unintended folder location.
Directory Traversal
NOP
Secure Multipurpose Mail Extension (S/MIME)
Cryptographic Key
15. A virus designed to infect the master boot record.
Authentication - Authorization - and Accounting (AAA)
John the Ripper - LOphtcrack - Ophtcrack - Cain and Abel
Application-Level Attacks
Master boot record infector
16. A wireless LAN security standard developed by IEEE. Requires Temporal Key Integrity Protocol (TKIP) and Advanced Encryption Standard (AES).
Exposure Factor
Ethernet
Interior Gateway Protocol (IGP)
802.11 i
17. An evaluation consisting of a document review - interviews - and demonstrations - as well as vulnerability scans and hands-on testing.
Level II assessment
stream cipher
FreeBSD
Whois
18. Software or hardware components that restrict access between a protected network and the Internet - or between other sets of networks - to block unwanted use or attacks.
firewall
Cookie
protocol
Mandatory access control (MAC)
19. Confidentiality - Integrity - and Availability are the three aspects of security and make up the triangle.
-sA
port scanning
CIA triangle
GET
20. RPC Scan
security defect
sheepdip
-sR
Level I assessment
21. Port 80/81/8080
Sign in Seal
Hacks with permission
HTTP
shoulder surfing
22. A standard for encrypting e-mail - web pages - and other stream-oriented information transmitted over the Internet.
Routing Protocol
security incident response team (SIRT)
Transport Layer Security (TLS)
-p <port ranges>
23. The process of systematically testing each port on a firewall to map rules and determine accessible ports.
firewalking
SID
proxy server
Data Link layer
24. Chronological record of system activities to enable the reconstruction and examination of the sequence of events and changes in an event.
sniffer
symmetric encryption
Audit Data
session splicing
25. A type of DNS transfer - where all records from an SOA are transmitted to the requestor. Zone transfers have two options: full (opcode AXFR) and incremental (IXFR).
Cryptography
out-of-band signaling
ISO 17799
Zone transfer
26. Paranoid scan timing
Cloning
qualitative analysis
HTTP tunneling
serial scan & 300 sec wait
27. A self-replicating - self-propagating - self-contained program that uses networking mechanisms to spread itself.
packet
site survey
Worm
script kiddie
28. Traffic-passing technique used by bridges and switches in which traffic received on an interface is sent out all interfaces on the device except the interface on which the information was originally received. Traffic on a switch is flooded when it is
Information Technology (IT) asset valuation
reverse social engineering
flood
Web Spider
29. A program or piece of code inserted into a system - usually covertly - with the intent of compromising the confidentiality - integrity - or availability of the victim's data - applications - or operating system. Malware consists of viruses - worms -
Malware
A R
Exploit
Computer-Based Attack
30. An HTTP command to transmit text to a web server for processing. The opposite of an HTTP GET.
personal identification number (PIN)
POST
Acceptable Use Policy (AUP)
LDAP
31. A computer virus that infects and spreads in multiple ways.
Multipartite virus
spyware
ring topology
DNS enumeration
32. A formal set of rules describing data transmission - especially across a network. A protocol determines the type of error checking - the data compression method - how the sending device will indicate completion - how the receiving device will indicat
route
port scanning
Audit Data
protocol
33. A method of defining what rights and permissions an entity has to a given resource. In networking - Access Control Lists are commonly associated with firewall and router traffic filtering rules.
Replacing numbers in a url to access other files
Hypertext Transfer Protocol Secure (HTTPS)
Access Control List (ACL)
null session
34. A computer network confined to a relatively small area - such as a single building or campus - in which devices connect through high-frequency radio waves using IEEE standard 802.11.
Wireless Local Area Network (WLAN)
Information Technology (IT) infrastructure
HTTP
Information Technology Security Evaluation Criteria (ITSEC)
35. A protocol defining packets that are able to be routed by a router.
routed protocol
rule-based access control
Virtual Local Area Network (VLAN)
A
36. The conveying of official access or legal power to a person or entity.
CIA triangle
Hacks with permission
Authorization
null session
37. An organization composed of engineers - scientists - and students who issue standards related to electrical - electronic - and computer engineering.
Institute of Electrical and Electronics Engineers (IEEE)
Active Fingerprinting
suicide hacker
Access Point (AP)
38. The monetary loss that can be expected for an asset due to risk over a one-year period. ALE is the product of the annual rate of occurrence (ARO) and the single loss expectancy (SLE). It is mathematically expressed as ALE = ARO
ad hoc mode
Fast Ethernet
Destination Unreachable
Annualized Loss Expectancy (ALE)
39. A method in cryptography by which cryptographic keys are exchanged between users - allowing use of a cryptographic algorithm (for example - the Diffie-Hellman key exchange).
key exchange protocol
Malware
Trusted Computer System Evaluation Criteria (TCSEC)
Wi-Fi
40. A computer file system architecture used in Windows - OS/2 - and most memory cards.
protocol stack
sheepdip
File Allocation Table (FAT)
Extensible Authentication Protocol (EAP)
41. Two or more LANs connected by a high-speed line across a large geographical area.
Contingency Plan
private network address
Wide Area Network (WAN)
802.11 i
42. Xmas Tree scan
security by obscurity
Eavesdropping
Asynchronous
-sX
43. A tool that helps a company to compare its actual performance with its potential performance.
gap analysis
Multipartite virus
overt channel
promiscuous mode
44. Weakness in an information system - system security procedures - internal controls - or implementation that could be exploited or triggered by a threat source.
gateway
risk
sidejacking
Vulnerability
45. The art and science of creating a covert message or image within another message - image - audio - or video file.
polymorphic virus
SID
-sR
steganography
46. A defined measure of service within a network system
Defines legal email marketing
Real application encompassing Trojan
quality of service (QoS)
False Acceptance Rate (FAR)
47. A text file stored within a browser by a web server that maintains information about the connection. Cookies are used to store information to maintain a unique but consistent surfing experience - but can also contain authentication parameters. Cookie
network access server
War Chalking
Cookie
proxy server
48. A security objective that ensures a resource can be accessed only by authorized users. This is also the property that sensitive information is not disclosed to unauthorized individuals - entities - or processes.
public key
security bulletins
RxBoot
Confidentiality
49. Whether purposeful or the result of malware or other attack - a backdoor is a hidden capability in a system or program for bypassing normal computer authentication systems.
Serial Line Internet Protocol (SLIP)
-sX
Droppers
Backdoor
50. The secret portion of an asymmetric key pair typically used to decrypt or digitally sign data. The private key is never shared and is always used for decryption - with one notable exception: The private key is used to encrypt the digital signature.
Authentication - Authorization - and Accounting (AAA)
Mandatory access control (MAC)
private key
CIA triangle