SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A computer network confined to a relatively small area - such as a single building or campus.
sidejacking
local area network (LAN)
Warm Site
Videocipher II Satellite Encryption System
2. A security protocol for wireless local area networks defined in the 802.11b standard; intended to provide the same level of security as a wired LAN. WEP is not considered strong security - although it does authenticate clients to access points - encr
Wired Equivalent Privacy (WEP)
Backdoor
POST
Daemon
3. A social-engineering attack using computer resources - such as e-mail or IRC.
Computer-Based Attack
Antivirus (AV) software
secure channel
payload
4. A person or entity indirectly involved in a relationship between two principles.
Application Layer
security bulletins
-PB
Third Party
5. Directing a protocol from one port to another.
Daisy Chaining
Virtual Private Network (VPN)
Detective Controls
port redirection
6. The ability to trace actions performed on a system to a specific user or system entity.
Replacing numbers in a url to access other files
Accountability
-sL
serialize scans & 15 sec wait
7. CAN-SPAM
human-based social engineering
Defines legal email marketing
Ciphertext
Hierarchical File System (HFS)
8. Physical socket provided on routers and switches for cable connections between a computer and the router/switch. This connection enables the computer to configure - query - and troubleshoot the router/switch by use of a terminal emulator and a comman
Console Port
-oA
single loss expectancy (SLE)
MD5
9. An industry standard protocol used for accessing and managing information within a directory service; an application protocol for querying and modifying data using directory services running over TCP/IP.
CIA triangle
-oN
Lightweight Directory Access Protocol (LDAP)
secure channel
10. The security property that data is not modified in an unauthorized and undetected manner. Also - the principle and measures taken to ensure that data received is in the exact same condition and state as when it was originally transmitted.
Smurf attack
Wide Area Network (WAN)
social engineering
integrity
11. An attack where the hacker manipulates parameters within the URL string in hopes of modifying data.
Trapdoor Function
parameter tampering
protocol
Time Bomb
12. Idlescan
Covert Channel
-sI
Vulnerability Scanning
Discretionary Access Control (DAC)
13. A denial-of-service technique that uses numerous hosts to perform the attack.
Virtual Private Network (VPN)
Third Party
Distributed DoS (DDoS)
Cracker
14. Wireless LAN standards created by IEEE. 802.11a runs at up to 54Mbps at 5GHz - 802.11b runs at 11Mbps at 2.4GHz - 802.11g runs at 54Mbps at 2.4GHz - and 802.11n can run upwards of 150MBps.
Exploit
War Driving
Hierarchical File System (HFS)
802.11
15. An adapter that provides the physical connection to send and receive data between the computer and the network media.
network interface card (NIC)
-sV
Temporal Key Integrity Protocol (TKIP)
Tunneling Virus
16. Attacks on the actual programming code of an application.
Application-Level Attacks
gateway
Trusted Computer System Evaluation Criteria (TCSEC)
spyware
17. A simple PPP authentication mechanism in which the user name and password are transmitted in clear text to prove identity. PAP compares the user name and password to a table listing authorized users.
SYN flood attack
Confidentiality
Password Authentication Protocol (PAP)
polymorphic virus
18. A technology where you advertise one IP address externally and data packets are rerouted to the appropriate IP address inside your network by a device providing translation services. In this way - IP addresses of machines on your internal network are
U P F
Network Address Translation (NAT)
S
Annualized Loss Expectancy (ALE)
19. A communications channel that is being used for a purpose it was not intended for - usually to transfer information secretly.
Covert Channel
phishing
risk
-p <port ranges>
20. The process of transforming ciphertext into plaintext through the use of a cryptographic algorithm.
initial sequence number (ISN)
Vulnerability Assessment
No previous knowledge of the network
Decryption
21. An encryption standard designed by Joan Daemen and Vincent Rijmen. Chosen by a NIST contest to be the Advanced Encryption Standard (AES).
Client
Routing Protocol
Rijndael
Telnet
22. The science or study of protecting information - whether in transit or at rest - by using techniques to render the information unusable to anyone who does not possess the means to decrypt it.
Bit Flipping
Electronic Code Book (ECB)
false rejection rate (FRR)
Cryptography
23. TCP connect() scan
Macro virus
Timestamping
-sT
Antivirus (AV) software
24. LAN standard - defined by ANSI X3T9.5 - specifying a 100Mbps token-passing network using fiber-optic cable and a dualring architecture for redundancy - with transmission distances of up to two kilometers.
Challenge Handshake Authentication Protocol (CHAP)
network operations center (NOC)
XOR Operation
Fiber Distributed Data Interface (FDDI)
25. Any network incident that prompts some kind of log entry or other notification.
Digital Signature
flood
scope creep
Event
26. An outdated symmetric cipher encryption algorithm - previously U.S. government-approved and used by business and civilian government agencies. DES is no longer considered secure due to the ease with which the entire keyspace can be attempted using mo
International Organization for Standardization (ISO)
Data Encryption Standard (DES)
Domain Name System (DNS) cache poisoning
-sU
27. A storage buffer that transparently stores data so future requests for the same data can be served faster.
Kerberos
Level III assessment
Cache
Exploit
28. A firewall evasion technique whereby packets are wrapped in HTTP - as a covert channel to the target.
Distributed DoS (DDoS)
HTTP tunneling
Extensible Authentication Protocol (EAP)
service level agreements (SLAs)
29. A proprietary - open - wireless technology used for transferring data from fixed and mobile devices over short distances.
Bluetooth
DNS enumeration
RID Resource identifier
Point-to-Point Tunneling Protocol (PPTP)
30. Nmap grepable output
-oG
Traceroute
intrusion prevention system (IPS)
Bluetooth
31. A protocol that allows a client computer to request services from a server and the server to return the results.
gray box testing
Point-to-Point Tunneling Protocol (PPTP)
remote procedure call (RPC)
-PM
32. Software that has advertisements embedded within. Generally displays ads in the form of pop-ups.
Adware
asynchronous transmission
-sO
Vulnerability Scanning
33. A text file stored within a browser by a web server that maintains information about the connection. Cookies are used to store information to maintain a unique but consistent surfing experience - but can also contain authentication parameters. Cookie
net use \[target ip]IPC$ '' /user:''
router
Transmission Control Protocol (TCP)
Cookie
34. The act of searching for Wi-Fi wireless networks by a person in a moving vehicle - using a portable device.
SID
Access Point (AP)
out-of-band signaling
War Driving
35. FIN Scan
Boot Sector Virus
Fast Ethernet
routed protocol
-sF
36. A group of penetration testers that assess the security of an organization - which is often unaware of the existence of the team or the exact assignment.
Pretty Good Privacy (PGP)
Secure Sockets Layer (SSL)
-PI
red team
37. Another term for firewalking
Transport Layer Security (TLS)
Demilitarized Zone (DMZ)
port knocking
Eavesdropping
38. An attack with the goal of preventing authorized users from accessing services and preventing the normal operation of computers and networks.
protocol stack
Denial of Service (DoS)
Secure Sockets Layer (SSL)
Destination Unreachable
39. Occurs when authorized users accumulate excess privileges on a system due to moving from position to position.
No previous knowledge of the network
Access Creep
Pretty Good Privacy (PGP)
Videocipher II Satellite Encryption System
40. An evaluation consisting of a document review - interviews - and demonstrations. No hands-on testing is performed.
Brute-Force Password Attack
piggybacking
Packet Internet Groper (ping)
Level I assessment
41. A self-replicating - self-propagating - self-contained program that uses networking mechanisms to spread itself.
Network Address Translation (NAT)
The automated process of proactively identifying vulnerabilities of computing systems present in a network
Worm
Lightweight Directory Access Protocol (LDAP)
42. A value assigned to uniquely identify a single wide area network (WAN) in wireless LANs. SSIDs are broadcast by default - and are sent in the header of every packet. SSIDs provide no encryption or security.
Service Set Identifier (SSID)
Wiretapping
protocol
A S
43. 18 U.S.C. 1029
gray hat
Possession of access devices
Malicious code
Detective Controls
44. A group of experts that handles computer security incidents.
serial scan & 300 sec wait
open source
parameter tampering
security incident response team (SIRT)
45. Text or data in its encrypted form; the result of plaintext being input into a cryptographic algorithm.
spam
port knocking
overt channel
Ciphertext
46. A wireless access point that has either been installed on a secure company network without explicit authorization from a local network administrator - or has been created to allow a hacker to conduct a man-in-the-middle attack.
rogue access point
pattern matching
Information Technology Security Evaluation Criteria (ITSEC)
Domain Name System (DNS)
47. A unique numerical string - created by a hashing algorithm on a given piece of data - used to verify data integrity. Generally hashes are used to verify the integrity of files after download (comparison to the hash value on the site before download)
Virus Hoax
serial scan & 300 sec wait
A R
hash
48. An Application layer protocol - using TCP - for transporting files across an Internet connection. FTP transmits in clear text.
RPC-DCOM
File Transfer Protocol (FTP)
Presentation layer
R
49. A type of malware that covertly collects information about a user.
Dumpster Diving
SYN flood attack
node
spyware
50. ICMP Type/Code 11
Packet Internet Groper (ping)
risk assessment
serial scan & 300 sec wait
Time exceeded
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests