SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A method of evaluating the security of a computer system or network by simulating an attack from a malicious source.
flood
fully qualified domain name (FQDN)
penetration testing
File Allocation Table (FAT)
2. The default network authentication suite of protocols for Windows NT 4.0
symmetric algorithm
Point-to-Point Tunneling Protocol (PPTP)
keylogger
NT LAN Manager (NTLM)
3. A type of denial-of-service attack where a hacker sends thousands of SYN packets to the target with spoofed IP addresses.
SYN attack
Virus
signature scanning
Web Spider
4. A set of exclusive rights granted by the law of a jurisdiction to the author or creator of an original work - including the right to copy - distribute - and adapt the work.
Copyright
packet
script kiddie
Certificate
5. The steps taken to gather evidence and information on the targets you wish to attack.
reconnaissance
-sV
Virtual Private Network (VPN)
identity theft
6. A protocol defining packets that are able to be routed by a router.
Vulnerability
steganography
router
routed protocol
7. 18 U.S.C. 1029
Possession of access devices
Console Port
Wired Equivalent Privacy (WEP)
Media Access Control (MAC)
8. Set of tools (applications or code) that enables administrator-level accessto a computer or computer network and is designed to obscure the fact that the system has been compromised. Rootkits are dangerous malware entities that provide administrator
rootkit
Baseline
serialize scans & 15 sec wait
symmetric algorithm
9. A point-to-point connection between two endpoints created to exchangedata. Typically a tunnel is either an encrypted connection - or a connection using a protocol in a method for which it was not designed. An encrypted connection forms a point-to-poi
Bastion host
Traceroute
Tunnel
ping sweep
10. A term trademarked by the Wi-Fi Alliance - used to define a standard for devices to use to connect to a wireless network.
Daisy Chaining
passive attack
Wi-Fi
Contingency Plan
11. White hat
Wired Equivalent Privacy (WEP)
Hacks with permission
Serial Line Internet Protocol (SLIP)
802.11
12. A computer file system architecture used in Windows - OS/2 - and most memory cards.
Syslog
File Allocation Table (FAT)
Point-to-Point Protocol (PPP)
risk
13. Ping Scan
inference attack
-sP
Denial of Service (DoS)
War Driving
14. Nmap normal output
reconnaissance
Vulnerability
logic bomb
-oN
15. In penetration testing - this is a method of testing the security of a system or subnet without any previous knowledge of the device or network. Designed to simulate an attack by an outside intruder (usually from the Internet).
Authentication
Black Box Testing
shoulder surfing
reconnaissance
16. FTP Bounce Attack
-oA
ECHO reply
Destination Unreachable
-b
17. The directory service created by Microsoft for use on itsnetworks. Provides a variety of network services using Lightweight Directory Access Protocol (LDAP) - Kerberos-based authentication - and single sign-on for user access to network-based resourc
Active Directory (AD)
Malware
Information Technology Security Evaluation Criteria (ITSEC)
Directory Traversal
18. An evaluation consisting of a document review - interviews - and demonstrations - as well as vulnerability scans and hands-on testing.
Decryption
Level II assessment
Domain Name
encapsulation
19. Software or hardware components that restrict access between a protected network and the Internet - or between other sets of networks - to block unwanted use or attacks.
segment
iris scanner
Post Office Protocol 3 (POP3)
firewall
20. Any network incident that prompts some kind of log entry or other notification.
Fast Ethernet
Event
Syslog
Exploit
21. An authentication method on point-to-point links - using a three-way handshake and a mutually agreed-upon key.
Ethernet
Wrapper
Challenge Handshake Authentication Protocol (CHAP)
sheepdip
22. Aggressive scan timing
enumeration
protocol
Telnet
parallel scan & 300 sec timeout & 1.25 sec/probe
23. The monetary value expected from the occurrence of a risk on an asset. It is mathematically expressed as single loss expectancy (SLE) = asset value (AV)
single loss expectancy (SLE)
stateful packet filtering
Bastion host
EDGAR database
24. The set of all hardware - firmware - and/or software components critical to IT security. Bugs or vulnerabilities occurring inside the TCB might jeopardize the security properties of the entire system.
Trusted Computer Base (TCB)
POST
DNS
overt channel
25. A wireless LAN device that acts as a central point for all wireless traffic. The AP is connected to both the wireless LAN and the wired LAN - providing wireless clients access to network resources.
Access Point (AP)
False Acceptance Rate (FAR)
Discretionary Access Control (DAC)
Computer-Based Attack
26. A comparison metric for different biometric devices and technologies; the point at which the false acceptance rate (FAR) equals the
port knocking
Destination Unreachable
Crossover Error Rate (CER)
intranet
27. Actions - devices - procedures - techniques - or other measures intended to reduce the vulnerability of an information system.
Internet service provider (ISP)
Availability
Countermeasures
fully qualified domain name (FQDN)
28. A network deployed as a trap to detect - deflect - or deter unauthorized use of information systems.
honeynet
private network address
Fiber Distributed Data Interface (FDDI)
User Datagram Protocol (UDP)
29. A technology where you advertise one IP address externally and data packets are rerouted to the appropriate IP address inside your network by a device providing translation services. In this way - IP addresses of machines on your internal network are
-sF
firewall
Antivirus (AV) software
Network Address Translation (NAT)
30. A device providing temporary - on-demand - point-to-point network access to users.
Bluesnarfing
network access server
Network Address Translation (NAT)
NT LAN Manager (NTLM)
31. A function that is easy to compute in one direction - yet believed to be difficult to compute in the opposite direction (finding its inverse) without special information - called the 'trapdoor.' Widely used in cryptography.
-sL
Access Control List (ACL)
Trapdoor Function
parallel scan & 75 sec timeout & 0.3 sec/probe
32. An attack where the hacker manipulates parameters within the URL string in hopes of modifying data.
site survey
Authentication
Fast Ethernet
parameter tampering
33. All measures and techniques taken to gather information about an intended target. Footprinting can be passive or active.
Application-Level Attacks
Virus
footprinting
War Dialing
34. The subjective - potential percentage of loss to a specific asset if a specific threat is realized. The exposure factor (EF) is a subjective value the person assessing risk must define.
remote access
Hacks without permission
network access server
Exposure Factor
35. Transmitting one protocol encapsulated inside another protocol.
Tunneling
risk acceptance
honeynet
intrusion prevention system (IPS)
36. A software program for remotely controlling a Microsoft Windows computer system over a network. Generally considered malware.
NetBus
-oA
-PM
self encrypting
37. A means of restricting access to system resources based on the sensitivity (as represented by a label) of the information contained in the system resource and the formal authorization (that is - clearance) of users to access information of such sensi
Mandatory access control (MAC)
CIA triangle
stateful packet filtering
-PS
38. A form of fraud in which someone pretends to be someone else by assuming that person's identity - typically in order to access resources or obtain credit and other benefits in that person's name.
Access Control List (ACL)
qualitative analysis
identity theft
private network address
39. An international encoding standard - working within multiple languages and scripts - that represents each letter - digit - or symbol with a unique numeric value that applies across different platforms.
remote access
smart card
Vulnerability
Unicode
40. A networking configuration where all nodes are connected in a circle with no terminated ends on the cable.
Password Authentication Protocol (PAP)
Internet Protocol (IP)
ring topology
Computer-Based Attack
41. The public portion of an asymmetric key pair typically used to encrypt data or verify signatures. Public keys are shared and are used to encrypt messages.
-oA
Trusted Computer Base (TCB)
Hacks with permission
public key
42. Baseband LAN specification developed by Xerox Corporation - Intel - and Digital Equipment Corporation. One of the least expensive - most widely deployed networking standards; uses the CSMA/CD method of media access control.
Ethernet
Administratively Prohibited
A R
Collision
43. ICMP Timestamp
script kiddie
Contingency Plan
Cryptographic Key
-PP
44. An approach to restricting system access to authorized users in which roles are created for various job functions. The permissions to perform certain operations are assigned to specific roles. Members of staff (or other system users) are assigned par
role-based access control
MD5
local area network (LAN)
Virus
45. The security property that data is not modified in an unauthorized and undetected manner. Also - the principle and measures taken to ensure that data received is in the exact same condition and state as when it was originally transmitted.
EDGAR database
Bluejacking
integrity
End User Licensing Agreement (EULA)
46. nmap
rogue access point
Active Directory (AD)
--randomize_hosts -O OS fingerprinting
SOA record
47. A portion of memory used to temporarily store output or input data.
Wired Equivalent Privacy (WEP)
Smurf attack
Buffer
encapsulation
48. A distance-vector routing protocol that employs the hop count as a routing metric. The 'hold down time -' used to define how long a route is held in memory - is 180 seconds. RIP prevents routing loops by implementing a limit on the number of hops all
reverse lookup; reverse DNS lookup
Routing Information Protocol (RIP)
identity theft
security bulletins
49. A cell phone attack in which the serial number from one cell phone is copied to another in an effort to copy the cell phone.
overt channel
Wired Equivalent Privacy (WEP)
Filter
Cloning
50. An Application layer protocol for sending electronic mail between servers.
False Acceptance Rate (FAR)
sniffer
Banner Grabbing
Simple Mail Transfer Protocol (SMTP)