SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Port 137/138/139
SMB
Bluejacking
Network Basic Input/Output System (NetBIOS)
Time Bomb
2. Vulnerability Scanning
Local Administrator
The automated process of proactively identifying vulnerabilities of computing systems present in a network
SOA record
Asynchronous
3. The monetary value expected from the occurrence of a risk on an asset. It is mathematically expressed as single loss expectancy (SLE) = asset value (AV)
single loss expectancy (SLE)
fully qualified domain name (FQDN)
File Transfer Protocol (FTP)
Event
4. A software program for remotely controlling a Microsoft Windows computer system over a network. Generally considered malware.
network access server
Network Basic Input/Output System (NetBIOS)
Hypertext Transfer Protocol (HTTP)
NetBus
5. Method used by antivirus software to detect new - unknown viruses that have not yet been identified; based on a piece-by-piece examination of a program - looking for a sequence or sequences of instructions that differentiate the virus from 'normal' p
heuristic scanning
Information Technology (IT) infrastructure
A
Availability
6. Part of a service contract where the level of service is formally defined; may be required as part of the initial pen test agreements.
Bluesnarfing
service level agreements (SLAs)
nslookup
Buffer Overflow
7. A set of hardware - software - people - policies - and procedures needed to create - manage - distribute - use - store - and revoke digital certificates.
False Acceptance Rate (FAR)
Challenge Handshake Authentication Protocol (CHAP)
public key infrastructure (PKI)
A
8. A file system used by the Mac OS.
Information Technology (IT) asset valuation
Cryptographic Key
Hierarchical File System (HFS)
risk
9. Port 31337
ping sweep
Daemon
source routing
Back orifice
10. A backlog of packets stored in buffers and waiting to be forwarded over an interface.
MAC filtering
queue
Audit Trail
Access Creep
11. An Application layer protocol used by local email clients to retrieve e-mail from a remote server over a TCP/IP connection.
Post Office Protocol 3 (POP3)
Buffer
hacktivism
Finding a directory listing and gaining access to a parent or root file for access to other files
12. An international organization composed of national standards bodies from over 75 countries. Developed the OSI reference model.
-sW
Sign in Seal
International Organization for Standardization (ISO)
hot site
13. A protocol used to pass control and error messages between nodes on the Internet.
port knocking
Vulnerability Assessment
Internet Control Message Protocol (ICMP)
Finger
14. A standard developed to enable routers to exchange messages containing information about routes to reach subnets in the network.
-sL
Temporal Key Integrity Protocol (TKIP)
Routing Protocol
Banner Grabbing
15. A computer virus that infects and spreads in multiple ways.
encapsulation
Multipartite virus
risk avoidance
Point-to-Point Protocol (PPP)
16. A type of attack used to deny service to legitimate users of a network resource by intentionally overloading the network with illegitimate TCP connection requests. SYN packets are sent repeatedly to the target - but the corresponding SYN/ACK response
Anonymizer
Digital Signature
SYN flood attack
spoofing
17. The result of using a private key to encrypt a hash value for identification purposes within a PKI system. The signature can be decoded by the originator's public key - verifying his identity and providing non-repudiation. A valid digital signature g
Level II assessment
Telnet
Digital Signature
stateful packet filtering
18. A mathematical operation requiring two binary inputs: If the inputs match - the output is a 0 - otherwise it is a 1.
Confidentiality
integrity
XOR Operation
separation of duties
19. Using conversation or some other interaction between people to gather useful information.
initial sequence number (ISN)
false rejection rate (FRR)
net use \[target ip]IPC$ '' /user:''
human-based social engineering
20. Devices - connected to one or more switches - grouped logically into a single broadcast domain. VLANs enable administrators to divide the devices connected to the switches into multiple VLANs without requiring separate physical switches.
Cache
Three-Way (TCP) Handshake
Virtual Local Area Network (VLAN)
serialize scans & 15 sec wait
21. A group of penetration testers that assess the security of an organization - which is often unaware of the existence of the team or the exact assignment.
Real application encompassing Trojan
limitation of liability and remedies
social engineering
red team
22. A string used for authentication in SNMP. The public community string is used for read-only searches - whereas the private community string is used for read/write. Community strings are transmitted in clear text in SNMPv1. SNMPv3 provides encryption
Hacks without permission
FreeBSD
Community String
Replacing numbers in a url to access other files
23. An attack that exploits the common mistake many people make when installing operating systems
Presentation layer
Cryptography
operating system attack
Simple Object Access Protocol (SOAP)
24. ICMP Ping
forwarding
separation of duties
fully qualified domain name (FQDN)
-PI
25. A standard for encrypting and authenticating MIME data; used primarily for Internet e-mail.
Electronic serial number
Secure Multipurpose Mail Extension (S/MIME)
Annualized Loss Expectancy (ALE)
Database
26. Port 389
net use \[target ip]IPC$ '' /user:''
Copyright
LDAP
hashing algorithm
27. A software license agreement; a contract between the 'licensor' and purchaser establishing the right to use the software.
Audit Data
gap analysis
End User Licensing Agreement (EULA)
POST
28. An attack technique that tricks your DNS server into believing it has received authentic information when - in reality - it has been provided fraudulent data. DNS cache poisoning affects user traffic by sending it to erroneous or malicious end points
Active Attack
network tap
Bluetooth
Domain Name System (DNS) cache poisoning
29. The process of embedding information into a digital signal in a way that makes it difficult to remove.
rogue access point
Time To Live (TTL)
Demilitarized Zone (DMZ)
Digital Watermarking
30. A technology where you advertise one IP address externally and data packets are rerouted to the appropriate IP address inside your network by a device providing translation services. In this way - IP addresses of machines on your internal network are
Zenmap
Network Address Translation (NAT)
remote procedure call (RPC)
Methodology
31. A Windows-based GUI version of nmap.
Zenmap
-PM
Bug
Level I assessment
32. An adapter that provides the physical connection to send and receive data between the computer and the network media.
network interface card (NIC)
private key
802.11
suicide hacker
33. Software code - a portion of data - or sequence of commands intended to take advantage of a bug or vulnerability in order to cause unintended or unanticipated behavior to occur on computer software or hardware.
Address Resolution Protocol (ARP) table
stateful packet filtering
Exploit
social engineering
34. The rate at which a biometric system will incorrectly reject an access attempt by an authorized user.
false rejection rate (FRR)
Dumpster Diving
reverse lookup; reverse DNS lookup
network tap
35. A measurable - physical characteristic used to recognize the identity - or verify the claimed identity - of an applicant. Facial images - fingerprints - and handwriting samples are all examples of biometrics.
-sW
Biometrics
Temporal Key Integrity Protocol (TKIP)
port scanning
36. A section or subset of the network. Often a router or other routing device provides the end point of the segment.
segment
security breach or security incident
SMB
Block Cipher
37. A free - open source version of the Berkeley Software Distribution of Unix - often used in embedded systems.
-sP
risk acceptance
NetBSD
script kiddie
38. The act of using numerous electronic serial numbers on a cell phone until a valid number is located.
Tumbling
reverse social engineering
Common Internet File System/Server Message Block
Computer-Based Attack
39. A sublayer of layer 2 of the OSI model - the Data Link layer. It provides addressing and channel access control mechanisms that enable several terminals or network nodes to communicate within a multipoint network.
encapsulation
Master boot record infector
Media Access Control (MAC)
Filter
40. Malware designed to install some sort of virus - backdoor - and so on - on a target system.
Droppers
-oG
network operations center (NOC)
flood
41. ICMP Netmask
RPC-DCOM
private key
penetration testing
-PM
42. Malicious code that uses a polymorphic engine to mutate while keeping the original algorithm intact; the code changes itself each time it runs - but the function of the code will not change.
Access Control List (ACL)
Vulnerability Assessment
polymorphic virus
Blowfish
43. The act of dialing all numbers within an organization to discover open modems.
Zone transfer
SYN attack
Trusted Computer Base (TCB)
War Dialing
44. Window Scan
Event
Echo request
-sW
Authorization
45. Attacks on the actual programming code of an application.
Application-Level Attacks
stateful packet filtering
Kerberos
User Datagram Protocol (UDP)
46. Nmap normal output
Domain Name System (DNS)
Electronic serial number
-oN
firewalking
47. A network administration command-line tool available for many operating systems for querying the Domain Name System (DNS) to obtain domain name or IP address mappings or any other specific DNS record.
Internet Assigned Number Authority (IANA)
-sX
security defect
nslookup
48. A Unix-like computer operating system descending from the BSD. Open-BSD includes a number of security features absent or optional in other operating systems.
Hierarchical File System (HFS)
Access Point (AP)
Simple Mail Transfer Protocol (SMTP)
OpenBSD
49. A value assigned to uniquely identify a single wide area network (WAN) in wireless LANs. SSIDs are broadcast by default - and are sent in the header of every packet. SSIDs provide no encryption or security.
File Transfer Protocol (FTP)
encryption
security by obscurity
Service Set Identifier (SSID)
50. A brand name of analog scrambling and de-scrambling equipment for cable and satellite television - invented primarily to keep consumer Television receive-only (TVRO) satellite equipment from receiving TV programming except on a subscription basis.
steganography
Videocipher II Satellite Encryption System
queue
Trusted Computer System Evaluation Criteria (TCSEC)