SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. One or more locations from which control is exercised over a computer - television broadcast - or telecommunications network.
-sF
Archive
network operations center (NOC)
inference attack
2. ICMP Type/Code 11
Time exceeded
Threat
Vulnerability Management
-oA
3. The central part of a computer or communications system hardware firmware - and software that implements the basic security procedures for controlling access to system resources.
-PS
security kernel
Backdoor
serial scan & 300 sec wait
4. Safeguards or countermeasures to avoid - counteract - or minimize security risks.
U P F
hacktivism
Secure Sockets Layer (SSL)
security controls
5. An attacker who breaks into computer systems with malicious intent - without the owner's knowledge or permission.
firewall
Black Hat
ring topology
SNMP
6. Injecting traffic into the network to identify the operating system of a device.
Active Fingerprinting
404EE
impersonation
security kernel
7. A secret - typically consisting of only decimal digits - that a claimant memorizes and uses to authenticate his identity
personal identification number (PIN)
Anonymizer
CAM table
Authentication - Authorization - and Accounting (AAA)
8. ICMP Netmask
site survey
Echo request
-PM
Brute-Force Password Attack
9. The condition of a resource being ready for use and accessible by authorized users.
Availability
Defines legal email marketing
Brute-Force Password Attack
Banner Grabbing
10. A point of reference used to mark an initial state in order to manage change.
private network address
Daisy Chaining
Collision Domain
Baseline
11. An agreement between the penetration tester and the client detailing the activities the tester is permitted to perform.
penetration testing
Written Authorization
iris scanner
port knocking
12. A step-by-step method of solving a problem. In computing security - an algorithm is a set of mathematical rules (logic) for the process of encryption and decryption
-sW
hardware keystroke logger
Algorithm
Ciphertext
13. A distance-vector routing protocol that employs the hop count as a routing metric. The 'hold down time -' used to define how long a route is held in memory - is 180 seconds. RIP prevents routing loops by implementing a limit on the number of hops all
Active Fingerprinting
security bulletins
Routing Information Protocol (RIP)
network operations center (NOC)
14. A self-replicating - self-propagating - self-contained program that uses networking mechanisms to spread itself.
packet
parallel scan & 300 sec timeout & 1.25 sec/probe
Worm
queue
15. A computer security expert who performs security audits and penetration tests against systems or network segments - with the owner's full knowledge and permission - in an effort to increase security.
Ethical Hacker
Eavesdropping
-sA
serialize scans & 0.4 sec wait
16. A host designed to collect data on suspicious activity.
iris scanner
honeypot
ISO 17799
INFOSEC Assessment Methodology (IAM)
17. Idlescan
Domain Name System (DNS) lookup
Computer-Based Attack
-sI
human-based social engineering
18. Sneaky scan timing
-sF
serialize scans & 15 sec wait
honeynet
CNAME record
19. A denial-of-service attack where the attacker sends a ping to the network's broadcast address from the spoofed IP address of the target. All systems in the subnet then respond to the spoofed address - eventually flooding the device.
Smurf attack
Audit Trail
Lightweight Directory Access Protocol (LDAP)
National Security Agency
20. Controls internal to a system designed to resolve vulnerabilities and errors soon after they arise.
-PB
Digital Certificate
flood
Corrective Controls
21. White hat
Black Hat
Wide Area Network (WAN)
802.11
Hacks with permission
22. Cracking Tools
Eavesdropping
Blowfish
spam
John the Ripper - LOphtcrack - Ophtcrack - Cain and Abel
23. An authentication method on point-to-point links - using a three-way handshake and a mutually agreed-upon key.
Tiger Team
Back orifice
Kerberos
Challenge Handshake Authentication Protocol (CHAP)
24. Another term for firewalking
port knocking
session hijacking
-PT
risk transference
25. A free and popular version of the Unix operating system.
shoulder surfing
proxy server
Annualized Loss Expectancy (ALE)
FreeBSD
26. Window Scan
-sW
CIA triangle
piggybacking
firewall
27. A wireless networking mode where all clients connect to the wireless network through a central access point.
sheepdip
infrastructure mode
gray hat
Level III assessment
28. A group of people - gathered together by a business entity - working to address a specific problem or goal.
Tiger Team
source routing
Trusted Computer Base (TCB)
audit
29. Whether purposeful or the result of malware or other attack - a backdoor is a hidden capability in a system or program for bypassing normal computer authentication systems.
Distributed DoS (DDoS)
Last In First Out (LIFO)
404EE
Backdoor
30. A small Trojan program that listens on port 777.
Tini
Wireless Local Area Network (WLAN)
Lightweight Directory Access Protocol (LDAP)
Collision Domain
31. The combination of all IT assets - resources - components - and systems.
Information Technology (IT) infrastructure
replay attack
stateful packet filtering
service level agreements (SLAs)
32. An e-mail protection method using a secret message or image that can be referenced on any official communication with the site; if an e-mail is received without the image or message - the recipient knows it is not legitimate.
Access Point (AP)
No previous knowledge of the network
gap analysis
Sign in Seal
33. A software or hardware defect that often results in system vulnerabilities.
sniffer
-oG
-b
Bug
34. A record showing which user has accessed a given resource and what operations the user performed during a given period.
Audit Trail
HTTP
Archive
Network Basic Input/Output System (NetBIOS)
35. Vulnerability Scanning
Tunnel
TACACS
War Driving
The automated process of proactively identifying vulnerabilities of computing systems present in a network
36. A partially protected zone on a network - not exposed to the full fury of the Internet - but not fully behind the firewall. This technique is typically used on parts of the network that must remain open to the public (such as a web server) but must a
social engineering
Echo request
Demilitarized Zone (DMZ)
Back orifice
37. Start of Authority record. This record identifies the primary name server for the zone. The SOA record contains the host name of the server responsible for all DNS records within the namespace - as well as the basic properties of the domain.
SOA record
FTP
Boot Sector Virus
Tiger Team
38. A piece of code intentionally inserted into a software system that will perform a malicious function when specified conditions are met at some future point.
serialize scans & 15 sec wait
Internet Protocol (IP)
LDAP
logic bomb
39. A small space having two sets of interlocking doors; the first set of doors must close before the second set opens. Typically authentication is required for each door - often using different factors. For example - a smart card may open the first door
Mantrap
qualitative analysis
U P F
Dumpster Diving
40. FIN Scan
-sF
Bug
Back orifice
session hijacking
41. A documented process for a procedure designed to be consistent - repeatable - and accountable.
Methodology
Telnet
POST
queue
42. Part of a service contract where the level of service is formally defined; may be required as part of the initial pen test agreements.
A R
Cookie
flood
service level agreements (SLAs)
43. Terminal Access Controller Access-Control System. A remote authentication protocol that is used to communicate with an authentication server commonly used in Unix networks.
Destination Unreachable
SMB
Adware
TACACS
44. Authentication confirms the identity of the user or device. Authorization determines the privileges (rights) of the user or device. Accounting records the access attempts - both successful and unsuccessful.
Authentication - Authorization - and Accounting (AAA)
reconnaissance
Warm Site
Multipartite virus
45. A denial-of-service technique that uses numerous hosts to perform the attack.
Community String
Distributed DoS (DDoS)
Event
Tumbling
46. ICMP Ping
-PI
Master boot record infector
security by obscurity
Hypertext Transfer Protocol (HTTP)
47. A value used to control cryptographic operations - such as decryption -encryption - signature generation - and signature verification.
node
Cryptographic Key
Lightweight Directory Access Protocol (LDAP)
Port Address Translation (PAT)
48. The secret portion of an asymmetric key pair typically used to decrypt or digitally sign data. The private key is never shared and is always used for decryption - with one notable exception: The private key is used to encrypt the digital signature.
shrink-wrap code attacks
CIA triangle
private key
Blowfish
49. A security tool designed to protect a system or network against attacks by comparing traffic patterns against a list of both known attack signatures and general characteristics of how attacks may be carried out. Threats are rated and protective measu
intrusion prevention system (IPS)
Post Office Protocol 3 (POP3)
Access Control List (ACL)
symmetric encryption
50. Monitoring of telephone or Internet conversations - typically by covert means.
White Box Testing
Hacks with permission
Time exceeded
Wiretapping