SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Method used by antivirus software to detect new - unknown viruses that have not yet been identified; based on a piece-by-piece examination of a program - looking for a sequence or sequences of instructions that differentiate the virus from 'normal' p
RxBoot
Mantrap
heuristic scanning
queue
2. Port 161/162
SNMP
polymorphic virus
Echo request
FTP
3. The level of importance assigned to an IT asset
White Box Testing
private network address
Information Technology (IT) asset criticality
NetBus
4. Attacks on the actual programming code of an application.
Application-Level Attacks
Warm Site
Lightweight Directory Access Protocol (LDAP)
Media Access Control (MAC)
5. A communications path - such as the Internet - authorized for data transmission within a computer system or network.
impersonation
-sP
overt channel
Transport Layer Security (TLS)
6. 1. The path a packet travels to reach the intended destination. Each individual device along the path traveled is called a hop. 2. Information contained on a device containing instructions for reaching other nodes on the network. This information can
risk acceptance
Request for Comments (RFC)
-oA
route
7. A nonroutable IP address range intended for use only within the confines of a single organization - falling within the predefined ranges of 10.0.0.0 - 172.16-31.0.0 - or 192.168.0.0.
secure channel
smart card
session hijacking
private network address
8. Traffic-passing technique used by bridges and switches in which traffic received on an interface is sent out all interfaces on the device except the interface on which the information was originally received. Traffic on a switch is flooded when it is
Wi-Fi Protected Access (WPA)
flood
Internet service provider (ISP)
route
9. A data encryption/decryption program often used for e-mail and file storage.
Destination Unreachable
hashing algorithm
Pretty Good Privacy (PGP)
shoulder surfing
10. A domain composed of all the systems sharing any given physical transport media. Systems within a collision domain may collide with each other during the transmission of data. Collisions can be managed by CSMA/CD (collision detection) or CSMA/CA (col
Collision Domain
serial scan & 300 sec wait
Pretty Good Privacy (PGP)
social engineering
11. An attack that is direct in nature - usually where the attacker injects something into - or otherwise alters - the network or system target.
Active Attack
Sign in Seal
-sL
Virus
12. Window Scan
-sW
self encrypting
Event
Covert Channel
13. A protocol for exchanging packets over a serial line.
POP 3
Serial Line Internet Protocol (SLIP)
Time To Live (TTL)
FreeBSD
14. TCP connect() scan
gap analysis
hashing algorithm
firewall
-sT
15. A program designed to execute at a specific time to release malicious code onto the computer system or network.
Accountability
Hacks with permission
Time Bomb
rule-based access control
16. The act of using numerous electronic serial numbers on a cell phone until a valid number is located.
Time exceeded
Temporal Key Integrity Protocol (TKIP)
Tumbling
GET
17. The security property that data is not modified in an unauthorized and undetected manner. Also - the principle and measures taken to ensure that data received is in the exact same condition and state as when it was originally transmitted.
Traceroute
integrity
Baseline
Network Address Translation (NAT)
18. An approach to restricting system access to authorized users in which roles are created for various job functions. The permissions to perform certain operations are assigned to specific roles. Members of staff (or other system users) are assigned par
Finding a directory listing and gaining access to a parent or root file for access to other files
role-based access control
private network address
service level agreements (SLAs)
19. RPC Scan
Time To Live (TTL)
Black Box Testing
A procedure for identifying active hosts on a network.
-sR
20. A device providing temporary - on-demand - point-to-point network access to users.
network access server
gateway
Vulnerability Assessment
Last In First Out (LIFO)
21. ICMP Type/Code 11
POP 3
stateful packet filtering
Time exceeded
Simple Mail Transfer Protocol (SMTP)
22. An attack where the hacker manipulates parameters within the URL string in hopes of modifying data.
POP 3
parameter tampering
rootkit
parallel scan
23. A cryptographic attack where bits are manipulated in the ciphertext itself to generate a predictable outcome in the plaintext once it is decrypted.
footprinting
private network address
Bit Flipping
Destination Unreachable
24. A nonnumerical - subjective risk evaluation. Used with qualitative assessment (an evaluation of risk that results in ratings of none - low - medium - and high for the probability.)
Virtual Private Network (VPN)
Cloning
qualitative analysis
footprinting
25. A value used to control cryptographic operations - such as decryption -encryption - signature generation - and signature verification.
Cryptographic Key
LDAP
Distributed DoS (DDoS)
non-repudiation
26. A proprietary - open - wireless technology used for transferring data from fixed and mobile devices over short distances.
War Dialing
Bluetooth
port scanning
Real application encompassing Trojan
27. A wireless networking mode where all clients connect to the wireless network through a central access point.
Multipurpose Internet Mail Extensions (MIME)
open source
infrastructure mode
Access Point (AP)
28. Sending unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobile phones - PDAs - or laptop computers.
security controls
Threat
NOP
Bluejacking
29. The process of systematically testing each port on a firewall to map rules and determine accessible ports.
firewalking
public key infrastructure (PKI)
Fraud and related activity in connection with computers
Black Hat
30. The central part of a computer or communications system hardware firmware - and software that implements the basic security procedures for controlling access to system resources.
out-of-band signaling
security kernel
-PP
Secure Sockets Layer (SSL)
31. An attack in which the hacker can derive information from the ciphertext without actually decoding it. Sensitive information can be considered compromised if an adversary can infer its real value with a high level of confidence.
FreeBSD
Client
inference attack
DNS
32. A portion of memory used to temporarily store output or input data.
false rejection rate (FRR)
Buffer
Fiber Distributed Data Interface (FDDI)
NetBSD
33. FIN Scan
Cookie
-sF
Assessment
keylogger
34. A formal set of rules describing data transmission - especially across a network. A protocol determines the type of error checking - the data compression method - how the sending device will indicate completion - how the receiving device will indicat
ECHO reply
phishing
protocol
Anonymizer
35. A backlog of packets stored in buffers and waiting to be forwarded over an interface.
Collision
Challenge Handshake Authentication Protocol (CHAP)
queue
NT LAN Manager (NTLM)
36. A partially protected zone on a network - not exposed to the full fury of the Internet - but not fully behind the firewall. This technique is typically used on parts of the network that must remain open to the public (such as a web server) but must a
Demilitarized Zone (DMZ)
Internet Protocol Security (IPSec) architecture
Packet Internet Groper (ping)
File Allocation Table (FAT)
37. Evaluation in which testers attempt to penetrate the network.
-sT
Level III assessment
hot site
SYN attack
38. A computer system that performs tasks dictated by an attacker from a remote location. Zombies may be active or idle - and owners of the systems generally do not know their systems are compromised.
Zombie
security kernel
International Organization for Standardization (ISO)
security by obscurity
39. Wrapper or Binder
Anonymizer
Real application encompassing Trojan
Virus
Digital Certificate
40. A mode of operation for a block cipher - with the characteristic that each possible block of plaintext has a defined corresponding ciphertext value - and vice versa
Detective Controls
-sS
Electronic Code Book (ECB)
ad hoc mode
41. A class of algorithms for cryptography that use the same cryptographic key for both decryption and encryption.
symmetric algorithm
Finger
Cookie
Bastion host
42. A cyber attacker who acts without permission from - and gives prior notice to - the resource owner. Also known as a malicious hacker.
Data Link layer
Cracker
Malware
-sS
43. In penetration testing - this is a method of testing the security of a system or subnet without any previous knowledge of the device or network. Designed to simulate an attack by an outside intruder (usually from the Internet).
Community String
Black Box Testing
Reconnaissance - Scanning - Gaining Access - Maintaining Access - Covering Tracks
service level agreements (SLAs)
44. The rate at which a biometric system will incorrectly reject an access attempt by an authorized user.
Wired Equivalent Privacy (WEP)
false rejection rate (FRR)
keylogger
ad hoc mode
45. Conversion of plaintext to ciphertext through the use of a cryptographic algorithm.
Buffer Overflow
encryption
Availability
security breach or security incident
46. A distance-vector routing protocol that employs the hop count as a routing metric. The 'hold down time -' used to define how long a route is held in memory - is 180 seconds. RIP prevents routing loops by implementing a limit on the number of hops all
FreeBSD
Copyright
Last In First Out (LIFO)
Routing Information Protocol (RIP)
47. Defined in RFC 826 - ARP is a protocol used to map a known IP address to a physical (MAC) address.
SMB
Computer Emergency Response Team (CERT)
Zenmap
Address Resolution Protocol (ARP)
48. Network Scanning
EDGAR database
A procedure for identifying active hosts on a network.
Filter
Syslog
49. A Windows-based GUI version of nmap.
Cache
CIA triangle
Information Technology (IT) asset criticality
Zenmap
50. An agreement between the penetration tester and the client detailing the activities the tester is permitted to perform.
Threat
Routing Protocol
Written Authorization
Computer Emergency Response Team (CERT)