SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A symmetric key cryptographic algorithm that transforms a block of information at a time using a cryptographic key. For a block cipher algorithm - the length of the input block is the same as the length of the output block.
Backdoor
Discretionary Access Control (DAC)
Block Cipher
Trusted Computer Base (TCB)
2. Hex 29
smart card
Warm Site
EDGAR database
U P F
3. The means by which a recipient of a message can ensure the identity of the sender and that neither party can deny having sent or received the message. The most common method is through digital certificates.
non-repudiation
Mandatory access control (MAC)
Audit Data
-p <port ranges>
4. Two or more LANs connected by a high-speed line across a large geographical area.
Uniform Resource Locator (URL)
CAM table
NetBus
Wide Area Network (WAN)
5. A trusted entity that issues and revokes public key certificates. In a network - a CA is a trusted entity that issues - manages - and revokes security credentials and public keys for message encryption and/or authentication. Within a public key infra
Zombie
Certificate Authority (CA)
Droppers
International Organization for Standardization (ISO)
6. The act of searching for Wi-Fi wireless networks by a person in a moving vehicle - using a portable device.
Countermeasures
Detective Controls
War Driving
No previous knowledge of the network
7. A NAT method in which multiple internal hosts - using private IP addressing - can be mapped through a single public IP address using the session IDs and port numbers. An internal global IP address can support in excess of 65 -000 concurrent TCP and U
protocol
Defense in Depth
Port Address Translation (PAT)
Baseline
8. When an authorized person allows (intentionally or unintentionally) someone to pass through a secure door - despite the fact that the intruder does not have a badge.
Kerberos
TACACS
End User Licensing Agreement (EULA)
piggybacking
9. In computer security - this is an algorithm that uses separate keys for encryption and decryption.
POP 3
Database
risk avoidance
Asymmetric Algorithm
10. A technology that establishes a tunnel to create a private - dedicated - leased-line network over the Internet. The data is encrypted so it's readable only by the sender and receiver. Companies commonly use VPNs to allow employees to connect securely
-sO
proxy server
Virtual Private Network (VPN)
Malware
11. Phases of an attack
Fast Ethernet
shoulder surfing
Reconnaissance - Scanning - Gaining Access - Maintaining Access - Covering Tracks
FreeBSD
12. A device that provides access between two or more networks. Gateways are typically used to connect dissimilar networks.
site survey
Application-Level Attacks
Information Technology (IT) asset criticality
gateway
13. The change or growth of a project's scope
Challenge Handshake Authentication Protocol (CHAP)
scope creep
asynchronous transmission
physical security
14. A simple PPP authentication mechanism in which the user name and password are transmitted in clear text to prove identity. PAP compares the user name and password to a table listing authorized users.
Videocipher II Satellite Encryption System
Worm
Sign in Seal
Password Authentication Protocol (PAP)
15. A point-to-point connection between two endpoints created to exchangedata. Typically a tunnel is either an encrypted connection - or a connection using a protocol in a method for which it was not designed. An encrypted connection forms a point-to-poi
Internet service provider (ISP)
Tunnel
Kerberos
-PM
16. A sublayer of layer 2 of the OSI model - the Data Link layer. It provides addressing and channel access control mechanisms that enable several terminals or network nodes to communicate within a multipoint network.
physical security
shoulder surfing
Media Access Control (MAC)
Address Resolution Protocol (ARP) table
17. A piece of software - provided by the vendor - intended to update or fix known - discovered problems in a computer program or its supporting data.
Exposure Factor
Virus Hoax
heuristic scanning
patch
18. A card with a built-in microprocessor and memory used for identification or financial transactions. The card transfers data to and from a central computer when inserted into a reader.
smart card
Daemon
gray box testing
Cryptographic Key
19. The secret portion of an asymmetric key pair typically used to decrypt or digitally sign data. The private key is never shared and is always used for decryption - with one notable exception: The private key is used to encrypt the digital signature.
-sP
private key
Cold Site
Level I assessment
20. An approach to restricting system access to authorized users in which roles are created for various job functions. The permissions to perform certain operations are assigned to specific roles. Members of staff (or other system users) are assigned par
Simple Mail Transfer Protocol (SMTP)
role-based access control
Application Layer
Wide Area Network (WAN)
21. Formerly Redundant Array of Inexpensive Disks; a technology that provides increased storage functions and reliability through redundancy. This is achieved by combining multiple disk drive components into a logical unit - where data is distributed acr
public key infrastructure (PKI)
phishing
Redundant Array of Independent Disks (RAID)
encapsulation
22. A documented process for a procedure designed to be consistent - repeatable - and accountable.
rogue access point
Extensible Authentication Protocol (EAP)
Methodology
Authorization
23. The central part of a computer or communications system hardware firmware - and software that implements the basic security procedures for controlling access to system resources.
Digital Watermarking
Droppers
security kernel
Zone transfer
24. Sending packets or requests to another system to gain information to be used to identify weaknesses and protect the system from attacks.
key exchange protocol
TACACS
Vulnerability Scanning
Hierarchical File System (HFS)
25. Idlescan
-sI
sheepdip
War Dialing
Access Control List (ACL)
26. In penetration testing - this is a method of testing the security of a system or subnet without any previous knowledge of the device or network. Designed to simulate an attack by an outside intruder (usually from the Internet).
Black Box Testing
Kerberos
Audit Trail
risk acceptance
27. A security tool designed to protect a system or network against attacks by comparing traffic patterns against a list of both known attack signatures and general characteristics of how attacks may be carried out. Threats are rated and reported.
File Allocation Table (FAT)
intrusion detection system (IDS)
Console Port
security defect
28. A hybrid of the HTTP and SSL/TLS protocols that provides encrypted communication and secure identification of a web server.
single loss expectancy (SLE)
packet
null session
Hypertext Transfer Protocol Secure (HTTPS)
29. A condition that occurs when more data is written to a buffer than it has space to store - and results in data corruption or other system errors. This is usually due to insufficient bounds checking - a bug - or improper configuration in the program c
segment
personal identification number (PIN)
Buffer Overflow
shrink-wrap code attacks
30. The act of using numerous electronic serial numbers on a cell phone until a valid number is located.
Availability
quantitative risk assessment
Tumbling
Fiber Distributed Data Interface (FDDI)
31. The process of systematically testing each port on a firewall to map rules and determine accessible ports.
Macro virus
firewalking
gap analysis
identity theft
32. A method of permitting only MAC addresses in a preapproved list network access. Addresses not matching are blocked.
rogue access point
MAC filtering
Rijndael
heuristic scanning
33. Part of a service contract where the level of service is formally defined; may be required as part of the initial pen test agreements.
service level agreements (SLAs)
Virus Hoax
Data Link layer
Cryptography
34. Used for exchanging structured information - such as XML-based messages - in the implementation of web services
Written Authorization
site survey
self encrypting
Simple Object Access Protocol (SOAP)
35. An Ethernet networking system transmitting data at 100 million bits per second (Mbps) - 10 times the speed of an earlier Ethernet standard. Derived from the Ethernet 802.3 standard - it is also known as 100BaseT.
rogue access point
intranet
Fast Ethernet
rule-based access control
36. A software or hardware application or device that captures user keystrokes.
physical security
enumeration
keylogger
source routing
37. A social-engineering effort in which the attacker pretends to be an employee - a valid user - or even an executive to elicit information or access.
Bug
Three-Way (TCP) Handshake
impersonation
ISO 17799
38. A symmetric - block-cipher data-encryption standard that uses a variablelength key that can range from 32 bits to 448 bits.
Trapdoor Function
Blowfish
security kernel
Finger
39. An attack in which the hacker can derive information from the ciphertext without actually decoding it. Sensitive information can be considered compromised if an adversary can infer its real value with a high level of confidence.
Event
inference attack
gateway
Open System Interconnection (OSI) Reference Model
40. A protocol used for sending and receiving log information for nodes on a network.
Syslog
risk assessment
social engineering
Boot Sector Virus
41. A computer placed outside a firewall to provide public services to other Internet sites - and hardened to resist external attacks.
security controls
Bastion host
Challenge Handshake Authentication Protocol (CHAP)
Last In First Out (LIFO)
42. An evaluation consisting of a document review - interviews - and demonstrations. No hands-on testing is performed.
polymorphic virus
Wired Equivalent Privacy (WEP)
Internet service provider (ISP)
Level I assessment
43. The process of determining if a network entity (user or service) is legitimate
-PI
Certificate Authority (CA)
Authentication
Simple Mail Transfer Protocol (SMTP)
44. A VPN tunneling protocol with encryption. PPTP connects two nodes in a VPN by using one TCP port for negotiation and authentication and one IP protocol for data transfer.
sheepdip
Point-to-Point Tunneling Protocol (PPTP)
Address Resolution Protocol (ARP)
Auditing
45. The rate at which a biometric system will incorrectly reject an access attempt by an authorized user.
Digital Signature
Tunneling
802.11
false rejection rate (FRR)
46. A method of password cracking whereby all possible options are systematically enumerated until a match is found. These attacks try every password (or authentication option) - one after another - until successful. Bruteforce attacks take a long time t
-sR
hash
Brute-Force Password Attack
packet filtering
47. Literally - 'not balanced or the same.' In computing - asymmetric refers to a difference in networking speeds upstream to downstream. In cryptography - it's the use of more than one key for encryption/authentication purposes.
Community String
POST
Asymmetric
Buffer
48. A type of denial-of-service attack where a hacker sends thousands of SYN packets to the target with spoofed IP addresses.
Access Control List (ACL)
Mandatory access control (MAC)
SYN attack
intrusion detection system (IDS)
49. List Scan
Buffer Overflow
-sL
symmetric algorithm
security defect
50. A backup facility with the electrical and physical components of a computer facility - but with no computer equipment in place. The site is ready to receive the necessary replacement computer equipment in the event the user has to move from his main
public key
Cold Site
red team
National Security Agency