SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. NSA
National Security Agency
sidejacking
symmetric encryption
Traceroute
2. Calculations of two components of risk: R - the magnitude of the potential loss (L) - and the probability - p - that the loss will occur.
quantitative risk assessment
POST
red team
non-repudiation
3. A networking configuration where all nodes are connected in a circle with no terminated ends on the cable.
ring topology
National Security Agency
Domain Name System (DNS)
Internet Assigned Number Authority (IANA)
4. A wireless LAN device that acts as a central point for all wireless traffic. The AP is connected to both the wireless LAN and the wired LAN - providing wireless clients access to network resources.
Kerberos
audit
risk avoidance
Access Point (AP)
5. Method used by antivirus software to detect new - unknown viruses that have not yet been identified; based on a piece-by-piece examination of a program - looking for a sequence or sequences of instructions that differentiate the virus from 'normal' p
heuristic scanning
flood
Overwhelm CAM table to convert switch to hub mode
Mandatory access control (MAC)
6. The means by which a recipient of a message can ensure the identity of the sender and that neither party can deny having sent or received the message. The most common method is through digital certificates.
Level III assessment
404EE
Fiber Distributed Data Interface (FDDI)
non-repudiation
7. Host-based IDS. An IDS that resides on the host - protecting against file and folder manipulation and other host-based attacks and actions.
-b
Electronic serial number
hash
HIDS
8. A method in cryptography by which cryptographic keys are exchanged between users - allowing use of a cryptographic algorithm (for example - the Diffie-Hellman key exchange).
port scanning
Audit Trail
public key
key exchange protocol
9. Controlling access to a network by analyzing the headers of incoming and outgoing packets - and letting them pass or discarding them based on rule sets created by a network administrator. A packet filter allows or denies packets based on destination
gap analysis
protocol stack
packet filtering
-sR
10. RPC Scan
-sR
Active Directory (AD)
Smurf attack
security incident response team (SIRT)
11. A firewall evasion technique whereby packets are wrapped in HTTP - as a covert channel to the target.
HTTP tunneling
Smurf attack
encapsulation
Asymmetric Algorithm
12. A routing protocol developed to be used within a single organization.
Interior Gateway Protocol (IGP)
Exploit
Mandatory access control (MAC)
Replacing numbers in a url to access other files
13. A string that represents the location of a web resource
Cracker
Simple Object Access Protocol (SOAP)
Secure Multipurpose Mail Extension (S/MIME)
Uniform Resource Locator (URL)
14. A cell phone attack in which the serial number from one cell phone is copied to another in an effort to copy the cell phone.
Bug
Cloning
Fast Ethernet
Dumpster Diving
15. Literally - 'not balanced or the same.' In computing - asymmetric refers to a difference in networking speeds upstream to downstream. In cryptography - it's the use of more than one key for encryption/authentication purposes.
Acknowledgment (ACK)
Asymmetric
Point-to-Point Protocol (PPP)
Internet Protocol (IP)
16. A partially protected zone on a network - not exposed to the full fury of the Internet - but not fully behind the firewall. This technique is typically used on parts of the network that must remain open to the public (such as a web server) but must a
honeypot
Demilitarized Zone (DMZ)
Ethical Hacker
port knocking
17. An extensible mechanism for e-mail. A variety of MIME types exist for sending content such as audio - binary - or video using the Simple Mail Transfer Protocol (SMTP).
Hacks without permission
Multipurpose Internet Mail Extensions (MIME)
ring topology
Challenge Handshake Authentication Protocol (CHAP)
18. A file system used by the Mac OS.
Port Address Translation (PAT)
Hierarchical File System (HFS)
-sP
Media Access Control (MAC)
19. Directory Transversal
gap analysis
public key
Finding a directory listing and gaining access to a parent or root file for access to other files
Information Technology (IT) asset criticality
20. A computer virus that infects and spreads in multiple ways.
Reconnaissance - Scanning - Gaining Access - Maintaining Access - Covering Tracks
gray box testing
Multipartite virus
smart card
21. A protocol for transporting data packets across a packet switched internetwork (such as the Internet). IP is a routed protocol.
Internet Protocol (IP)
POP 3
routed protocol
Hypertext Transfer Protocol Secure (HTTPS)
22. A small space having two sets of interlocking doors; the first set of doors must close before the second set opens. Typically authentication is required for each door - often using different factors. For example - a smart card may open the first door
net use \[target ip]IPC$ '' /user:''
Timestamping
-PT
Mantrap
23. A social-engineering attack using computer resources - such as e-mail or IRC.
MD5
encapsulation
Temporal Key Integrity Protocol (TKIP)
Computer-Based Attack
24. Nmap ml output
-oX
Minimum acceptable level of risk
flood
-oG
25. Hex 14
Secure Sockets Layer (SSL)
Mantrap
A R
false rejection rate (FRR)
26. Window Scan
User Datagram Protocol (UDP)
Exposure Factor
Vulnerability Assessment
-sW
27. Layer 2 of the OSI reference model. This layer provides reliable transit of data across a physical link. The Data Link layer is concerned with physical addressing - network topology - access to the network medium - error detection - sequential delive
Data Link layer
MD5
Multipurpose Internet Mail Extensions (MIME)
stateful packet filtering
28. The act of searching for Wi-Fi wireless networks by a person in a moving vehicle - using a portable device.
risk acceptance
War Driving
Collision
FTP
29. A method of evaluating the security of a computer system or network by simulating an attack from a malicious source.
Algorithm
Audit Trail
Time To Live (TTL)
penetration testing
30. A hacker who aims to bring down critical infrastructure for a 'cause' and does not worry about the penalties associated with his actions.
-P0
Information Technology (IT) security architecture and framework
suicide hacker
asynchronous transmission
31. Software or firmware intended to perform an unauthorized process that will have an adverse impact on the confidentiality - integrity - or availability of an information system. A virus - worm - Trojan horse - or other code-based entity that infects a
spam
stream cipher
Malicious code
Archive
32. A virus designed to infect the master boot record.
-oN
NetBus
Ethernet
Master boot record infector
33. Terminal Access Controller Access-Control System. A remote authentication protocol that is used to communicate with an authentication server commonly used in Unix networks.
Tiger Team
TACACS
Time To Live (TTL)
Time Bomb
34. Set of tools (applications or code) that enables administrator-level accessto a computer or computer network and is designed to obscure the fact that the system has been compromised. Rootkits are dangerous malware entities that provide administrator
Wireless Local Area Network (WLAN)
Secure Sockets Layer (SSL)
Fraud and related activity in connection with computers
rootkit
35. A mathematical operation requiring two binary inputs: If the inputs match - the output is a 0 - otherwise it is a 1.
XOR Operation
Master boot record infector
heuristic scanning
-oG
36. A free and popular version of the Unix operating system.
FreeBSD
Virtual Local Area Network (VLAN)
Confidentiality
Vulnerability Management
37. A nonroutable IP address range intended for use only within the confines of a single organization - falling within the predefined ranges of 10.0.0.0 - 172.16-31.0.0 - or 192.168.0.0.
Data Link layer
Contingency Plan
private network address
Algorithm
38. Shifting responsibility from one party to another
Biometrics
risk transference
Common Internet File System/Server Message Block
Reconnaissance - Scanning - Gaining Access - Maintaining Access - Covering Tracks
39. Another term for firewalking
port knocking
fragmentation
personal identification number (PIN)
Echo request
40. ICMP Type/Code 11
Time exceeded
flood
-sV
Copyright
41. The combination of all IT assets - resources - components - and systems.
-oN
Authentication - Authorization - and Accounting (AAA)
Antivirus (AV) software
Information Technology (IT) infrastructure
42. A set of hardware - software - people - policies - and procedures needed to create - manage - distribute - use - store - and revoke digital certificates.
Extensible Authentication Protocol (EAP)
-PB
public key infrastructure (PKI)
RxBoot
43. Any circumstance or event with the potential to adversely impact organizationaloperations - organizational assets - or individuals through an information system via unauthorized access - destruction - disclosure - modification of information - and/or
Threat
social engineering
Serial Line Internet Protocol (SLIP)
Redundant Array of Independent Disks (RAID)
44. A denial-of-service attack where the attacker sends a ping to the network's broadcast address from the spoofed IP address of the target. All systems in the subnet then respond to the spoofed address - eventually flooding the device.
S
Trapdoor Function
Smurf attack
Cold Site
45. A point of reference used to mark an initial state in order to manage change.
Baseline
Google hacking
Wide Area Network (WAN)
smart card
46. A method of permitting only MAC addresses in a preapproved list network access. Addresses not matching are blocked.
initial sequence number (ISN)
-sT
parallel scan
MAC filtering
47. A comparison metric for different biometric devices and technologies; the point at which the false acceptance rate (FAR) equals the
Domain Name System (DNS) cache poisoning
Back orifice
Crossover Error Rate (CER)
Tini
48. A network deployed as a trap to detect - deflect - or deter unauthorized use of information systems.
honeynet
Demilitarized Zone (DMZ)
Adware
security incident response team (SIRT)
49. A skilled hacker that straddles the line between white hat (hacking only with permission and within guidelines) and black hat (malicious hacking for personal gain). Gray hats sometime perform illegal acts to exploit technology with the intent of achi
Virus Hoax
piggybacking
-oX
gray hat
50. A type 0 ICMP message used to reply to ECHO requests. Used with ping to verify network layer connectivity between hosts.
SID
Wireless Local Area Network (WLAN)
Domain Name System (DNS) cache poisoning
ECHO reply
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests