SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A domain composed of all the systems sharing any given physical transport media. Systems within a collision domain may collide with each other during the transmission of data. Collisions can be managed by CSMA/CD (collision detection) or CSMA/CA (col
Trusted Computer Base (TCB)
Bug
Collision Domain
Routing Information Protocol (RIP)
2. Controlling access to a network by analyzing the headers of incoming and outgoing packets - and letting them pass or discarding them based on rule sets created by a network administrator. A packet filter allows or denies packets based on destination
packet filtering
penetration testing
firewall
role-based access control
3. Start of Authority record. This record identifies the primary name server for the zone. The SOA record contains the host name of the server responsible for all DNS records within the namespace - as well as the basic properties of the domain.
Bluesnarfing
A procedure for identifying active hosts on a network.
ECHO reply
SOA record
4. The condition of a resource being ready for use and accessible by authorized users.
Three-Way (TCP) Handshake
Availability
physical security
human-based social engineering
5. Wrapper or Binder
Real application encompassing Trojan
Self Replicating
serialize scans & 15 sec wait
false negative
6. A host designed to collect data on suspicious activity.
gap analysis
honeypot
User Datagram Protocol (UDP)
Data Link layer
7. The basis of this kind of security is that an individual user - or program operating on the user's behalf - is allowed to specify explicitly the types of access other users (or programs executing on their behalf) may have to information under the use
Auditing
fully qualified domain name (FQDN)
Discretionary Access Control (DAC)
Acknowledgment (ACK)
8. Software or firmware intended to perform an unauthorized process that will have an adverse impact on the confidentiality - integrity - or availability of an information system. A virus - worm - Trojan horse - or other code-based entity that infects a
SNMP
site survey
Due Care
Malicious code
9. Nmap normal output
Possession of access devices
--randomize_hosts -O OS fingerprinting
-oN
Boot Sector Virus
10. Originally an extension of PPP - this is a protocol for authentication used within wireless networks. Works with multiple authentication measures.
Extensible Authentication Protocol (EAP)
Access Creep
SNMP
HTTP
11. Content Addressable Memory table. Holds all the MAC-address-to-port mappings on a switch.
CAM table
Serial Line Internet Protocol (SLIP)
parallel scan & 75 sec timeout & 0.3 sec/probe
Network Address Translation (NAT)
12. A three-step process computers execute to negotiate a connection with one another. The three steps are SYN - SYN/ACK - ACK.
public key
Three-Way (TCP) Handshake
risk assessment
POP 3
13. In regard to hash algorithms - this occurs when two or more distinct inputs produce the same output.
Collision
null session
Third Party
fully qualified domain name (FQDN)
14. NSA
overt channel
National Security Agency
Bug
secure channel
15. The set of all hardware - firmware - and/or software components critical to IT security. Bugs or vulnerabilities occurring inside the TCB might jeopardize the security properties of the entire system.
infrastructure mode
scope creep
Trusted Computer Base (TCB)
HIDS
16. A method of evaluating the security of a computer system or network by simulating an attack from a malicious source.
Buffer
Ciphertext
Cracker
penetration testing
17. Provides router-to-router or host-to-network connections over asynchronous and synchronous circuits.
symmetric algorithm
polymorphic virus
Point-to-Point Protocol (PPP)
rule-based access control
18. Also known as a digital certificate - this is an electronic file used to verify a user's identity - providing non-repudiation throughout the system It is also a set of data that uniquely identifies an entity. Certificates contain the entity's public
Internet Protocol (IP)
Certificate
INFOSEC Assessment Methodology (IAM)
forwarding
19. The concept of having more than one person required to complete a task
separation of duties
false rejection rate (FRR)
Domain Name System (DNS) cache poisoning
File Transfer Protocol (FTP)
20. ICMP Type/Code 8
Echo request
Media Access Control (MAC)
Due Care
Virtual Local Area Network (VLAN)
21. An unknown deficiency in software or some other product that results in a security vulnerability being identified.
security defect
Digital Certificate
National Security Agency
Bit Flipping
22. A fully qualified domain name consists of a host and domain name - including a top-level domain such as .com - .net - .mil - .edu -and so on.
Routing Information Protocol (RIP)
fully qualified domain name (FQDN)
initial sequence number (ISN)
-sF
23. A Unix-like computer operating system descending from the BSD. Open-BSD includes a number of security features absent or optional in other operating systems.
Hacks without permission
OpenBSD
File Transfer Protocol (FTP)
reverse lookup; reverse DNS lookup
24. IP Protocol Scan
Eavesdropping
Mandatory access control (MAC)
-sO
Serial Line Internet Protocol (SLIP)
25. Port 110
Wide Area Network (WAN)
halo effect
POP 3
Common Internet File System/Server Message Block
26. A backup facility with the electrical and physical components of a computer facility - but with no computer equipment in place. The site is ready to receive the necessary replacement computer equipment in the event the user has to move from his main
Presentation layer
Interior Gateway Protocol (IGP)
Serial Line Internet Protocol (SLIP)
Cold Site
27. A U.S. Department of Defense (DoD) standard that sets basic requirements for assessing the effectiveness of computer security controls built into a computer system.
Trusted Computer System Evaluation Criteria (TCSEC)
The automated process of proactively identifying vulnerabilities of computing systems present in a network
FTP
HTTP tunneling
28. A step-by-step method of solving a problem. In computing security - an algorithm is a set of mathematical rules (logic) for the process of encryption and decryption
gateway
Algorithm
LDAP
Uniform Resource Locator (URL)
29. In penetration testing - enumeration is the act of querying a device or network segment thoroughly and systematically for information.
Discretionary Access Control (DAC)
intrusion prevention system (IPS)
enumeration
Pretty Good Privacy (PGP)
30. An attack that is direct in nature - usually where the attacker injects something into - or otherwise alters - the network or system target.
Active Attack
Sign in Seal
War Dialing
802.11 i
31. LM Hash for short passwords (under 7)
Banner Grabbing
Level II assessment
404EE
Block Cipher
32. A method of external testing whereby several systems or resources are used together to effect an attack.
honeypot
-sA
replay attack
Daisy Chaining
33. 1. The path a packet travels to reach the intended destination. Each individual device along the path traveled is called a hop. 2. Information contained on a device containing instructions for reaching other nodes on the network. This information can
Redundant Array of Independent Disks (RAID)
public key
route
serialize scans & 15 sec wait
34. A connection-oriented - layer 4 protocol for transporting data over network segments. TCP is considered reliable because it guarantees delivery and the proper reordering of transmitted packets. This protocol is used for most long-haul traffic on the
Information Technology (IT) infrastructure
Transmission Control Protocol (TCP)
Address Resolution Protocol (ARP)
Bastion host
35. Wireless LAN standards created by IEEE. 802.11a runs at up to 54Mbps at 5GHz - 802.11b runs at 11Mbps at 2.4GHz - 802.11g runs at 54Mbps at 2.4GHz - and 802.11n can run upwards of 150MBps.
Access Creep
802.11
-PT
Self Replicating
36. A computer system that performs tasks dictated by an attacker from a remote location. Zombies may be active or idle - and owners of the systems generally do not know their systems are compromised.
Zombie
Tiger Team
Tunneling Virus
Zone transfer
37. A partially protected zone on a network - not exposed to the full fury of the Internet - but not fully behind the firewall. This technique is typically used on parts of the network that must remain open to the public (such as a web server) but must a
role-based access control
Virus Hoax
Demilitarized Zone (DMZ)
MAC filtering
38. A type of encryption where the same key is used to encrypt and decrypt the message.
public key
symmetric encryption
gap analysis
Packet Internet Groper (ping)
39. A Canonical Name record within DNS - used to provide an alias for a domain name.
Buffer
CNAME record
War Dialing
serialize scans & 0.4 sec wait
40. A communications channel that is being used for a purpose it was not intended for - usually to transfer information secretly.
Kerberos
-oN
Application Layer
Covert Channel
41. A protocol for exchanging packets over a serial line.
Serial Line Internet Protocol (SLIP)
Level II assessment
Trapdoor Function
Tunneling Virus
42. A number assigned during TCP startup sessions that tracks how much information has been moved. This number is used by hackers when hijacking sessions.
initial sequence number (ISN)
network access server
Archive
Cache
43. Steps taken to identify and limit risks to an acceptable or reasonable level of exposure.
Ethernet
Baseline
Active Fingerprinting
Due Diligence
44. A software or hardware application or device that captures user keystrokes.
replay attack
Time To Live (TTL)
keylogger
hacktivism
45. An e-mail message warning users of a nonexistent virus and encouraging them to pass on the message to other users.
gap analysis
Virus Hoax
802.11
spam
46. An e-mail protection method using a secret message or image that can be referenced on any official communication with the site; if an e-mail is received without the image or message - the recipient knows it is not legitimate.
Sign in Seal
Digital Certificate
parallel scan & 75 sec timeout & 0.3 sec/probe
Denial of Service (DoS)
47. Sneaky scan timing
Directory Traversal
serialize scans & 15 sec wait
public key infrastructure (PKI)
payload
48. nmap
Blowfish
--randomize_hosts -O OS fingerprinting
Packet Internet Groper (ping)
Banner Grabbing
49. A point of reference used to mark an initial state in order to manage change.
Virus
gateway
Baseline
honeypot
50. A wireless LAN security standard developed by IEEE. Requires Temporal Key Integrity Protocol (TKIP) and Advanced Encryption Standard (AES).
XOR Operation
802.11 i
parallel scan & 300 sec timeout & 1.25 sec/probe
Trusted Computer Base (TCB)