SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The potential for damage to or loss of an IT asset
Level III assessment
overt channel
non-repudiation
risk
2. Port 389
LDAP
hardware keystroke logger
Internet Protocol Security (IPSec) architecture
Authorization
3. Describes practices in production and development that promote access to the end product's source materials.
intranet
open source
Written Authorization
sniffer
4. Port 22
Transport Layer Security (TLS)
SSH
Baseline
HTTP tunneling
5. A technology that establishes a tunnel to create a private - dedicated - leased-line network over the Internet. The data is encrypted so it's readable only by the sender and receiver. Companies commonly use VPNs to allow employees to connect securely
Methodology
FreeBSD
Virtual Private Network (VPN)
Due Diligence
6. Any kind of connection that allows you to see all traffic passing by. Generally used in reference to a NIDS (network-based IDS) to monitor all traffic.
network tap
John the Ripper - LOphtcrack - Ophtcrack - Cain and Abel
Hierarchical File System (HFS)
LDAP
7. A situation in which an IDS or other sensor triggers on an event as an intrusion attempt - when it was actually legitimate traffic.
human-based social engineering
network access server
Annualized Loss Expectancy (ALE)
false negative
8. Idlescan
keylogger
-sI
A series of messages sent by someone attempting to break into a computer to learn about the computer's network services.
Kerberos
9. Content Addressable Memory table. Holds all the MAC-address-to-port mappings on a switch.
SYN flood attack
CAM table
Cryptography
secure channel
10. Hashing algorithm that results in a 128-bit output.
John the Ripper - LOphtcrack - Ophtcrack - Cain and Abel
MD5
null session
Baseline
11. ICMP Type/Code 11
Archive
Time exceeded
EDGAR database
Defines legal email marketing
12. The transmission of digital signals without precise clocking or synchronization.
SID
node
-PT
asynchronous transmission
13. As an identification device becomes more sensitive or accurate - its FAR decreases while its FRR increases. The CER is the point at which these two rates are equal - or cross over.
false rejection rate (FRR)
risk
hashing algorithm
National Security Agency
14. The process of sending a packet or frame toward the destination. In a switch - messages are forwarded only to the port they are addressed to.
-PM
Worm
forwarding
-sL
15. Literally - 'not balanced or the same.' In computing - asymmetric refers to a difference in networking speeds upstream to downstream. In cryptography - it's the use of more than one key for encryption/authentication purposes.
Asymmetric
SSH
network access server
Baseline
16. A software or hardware application or device that captures user keystrokes.
keylogger
proxy server
security incident response team (SIRT)
Audit Trail
17. A network system of servers that translates numeric Internet Protocol (IP) addresses into human-friendly - hierarchical Internet addresses - and vice versa.
asynchronous transmission
parallel scan & 300 sec timeout & 1.25 sec/probe
Anonymizer
Domain Name System (DNS)
18. A query and response protocol widely used for querying databases that store the registered users or assignees of an Internet resource - such as a domain name - an IP address - or an autonomous system.
NT LAN Manager (NTLM)
Kerberos
Whois
Digital Certificate
19. An Internet routing protocol used to exchange routing information within an autonomous system.
Time Bomb
router
Interior Gateway Protocol (IGP)
Availability
20. An Application layer protocol used by local email clients to retrieve e-mail from a remote server over a TCP/IP connection.
Post Office Protocol 3 (POP3)
Virtual Local Area Network (VLAN)
parallel scan
Trusted Computer Base (TCB)
21. Hex 04
R
Ethical Hacker
Acceptable Use Policy (AUP)
serial scan & 300 sec wait
22. Transmission using channels or frequencies outside those normally used for data transfer; often used for error reporting.
parallel scan & 75 sec timeout & 0.3 sec/probe
out-of-band signaling
protocol
Acceptable Use Policy (AUP)
23. A free - open source version of the Berkeley Software Distribution of Unix - often used in embedded systems.
separation of duties
-oA
SOA record
NetBSD
24. Conversion of plaintext to ciphertext through the use of a cryptographic algorithm.
encryption
out-of-band signaling
fragmentation
CAM table
25. A malicious computer program with self-replication capabilities that attaches to another file and moves with the host from one computer to another.
Virus
Accountability
ring topology
-sL
26. In penetration testing - enumeration is the act of querying a device or network segment thoroughly and systematically for information.
enumeration
802.11 i
-sV
site survey
27. A set of related communications protocols operating together as a group to address communication at some or all of the seven layers of the OSI reference model.
Routing Protocol
protocol stack
port knocking
forwarding
28. One or more locations from which control is exercised over a computer - television broadcast - or telecommunications network.
Point-to-Point Protocol (PPP)
Computer-Based Attack
public key infrastructure (PKI)
network operations center (NOC)
29. ICMP Type/Code 8
-PP
role-based access control
Echo request
Mandatory access control (MAC)
30. A software program for remotely controlling a Microsoft Windows computer system over a network. Generally considered malware.
-P0
Database
NetBus
Bluesnarfing
31. ICMP Netmask
FTP
-sP
-oG
-PM
32. A value assigned to uniquely identify a single wide area network (WAN) in wireless LANs. SSIDs are broadcast by default - and are sent in the header of every packet. SSIDs provide no encryption or security.
Service Set Identifier (SSID)
Confidentiality
Threat
packet
33. Xmas Tree scan
-sX
Institute of Electrical and Electronics Engineers (IEEE)
Syslog
Self Replicating
34. A program designed to browse websites in an automated - methodical manner. Sometimes these programs are used to harvest information from websites - such as e-mail addresses.
ISO 17799
Web Spider
-sT
spyware
35. A security protocol for wireless local area networks defined in the 802.11b standard; intended to provide the same level of security as a wired LAN. WEP is not considered strong security - although it does authenticate clients to access points - encr
Brute-Force Password Attack
key exchange protocol
Dumpster Diving
Wired Equivalent Privacy (WEP)
36. In computer security - this is an algorithm that uses separate keys for encryption and decryption.
Asymmetric Algorithm
symmetric algorithm
quality of service (QoS)
Address Resolution Protocol (ARP)
37. A three-step process computers execute to negotiate a connection with one another. The three steps are SYN - SYN/ACK - ACK.
Mandatory access control (MAC)
parallel scan & 75 sec timeout & 0.3 sec/probe
Three-Way (TCP) Handshake
session splicing
38. A connection-oriented - layer 4 protocol for transporting data over network segments. TCP is considered reliable because it guarantees delivery and the proper reordering of transmitted packets. This protocol is used for most long-haul traffic on the
Time To Live (TTL)
Denial of Service (DoS)
Transmission Control Protocol (TCP)
protocol stack
39. A series of documents and notes on standards used or proposed for use on the Internet; each is identified by a number.
Request for Comments (RFC)
Tini
ping sweep
Syslog
40. Manipulating a search string with additional specific operators to search for vulnerabilities or very specific information.
Defines legal email marketing
Warm Site
Google hacking
risk assessment
41. An adapter that provides the physical connection to send and receive data between the computer and the network media.
network interface card (NIC)
Black Hat
qualitative analysis
Droppers
42. ICMP Type/Code 3-13
INFOSEC Assessment Methodology (IAM)
Audit Trail
Administratively Prohibited
hot site
43. A computer process that requests a service from another computer and accepts the server's responses.
spam
Data Link layer
Audit Data
Client
44. A type of malware that covertly collects information about a user.
NetBus
spyware
reconnaissance
rogue access point
45. Drawing symbols in public places to alert others to an open Wi-Fi network. War chalking can include the SSIDs - administrative passwords to APs - and other information.
-sV
rootkit
Internet service provider (ISP)
War Chalking
46. Port 88
Countermeasures
Network Basic Input/Output System (NetBIOS)
Kerberos
Overwhelm CAM table to convert switch to hub mode
47. Software or firmware intended to perform an unauthorized process that will have an adverse impact on the confidentiality - integrity - or availability of an information system. A virus - worm - Trojan horse - or other code-based entity that infects a
out-of-band signaling
Authentication Header (AH)
Zombie
Malicious code
48. A protocol for exchanging packets over a serial line.
Serial Line Internet Protocol (SLIP)
Application Layer
Data Link layer
Warm Site
49. A function that is easy to compute in one direction - yet believed to be difficult to compute in the opposite direction (finding its inverse) without special information - called the 'trapdoor.' Widely used in cryptography.
RPC-DCOM
Trapdoor Function
Internet Assigned Number Authority (IANA)
Application-Level Attacks
50. A file system used by the Mac OS.
Digital Signature
Hierarchical File System (HFS)
asynchronous transmission
Antivirus (AV) software