SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A program designed to execute at a specific time to release malicious code onto the computer system or network.
remote procedure call (RPC)
Time Bomb
flood
shoulder surfing
2. A structured set of criteria for evaluating computer security within products and systems produced by European countries; it has been largely replaced by the Common Criteria.
Information Technology Security Evaluation Criteria (ITSEC)
FreeBSD
Accountability
Common Internet File System/Server Message Block
3. A derogatory term used to describe an attacker - usually new to the field - who uses simple - easy-to-follow scripts or programs developed by others to attack computer systems and networks and deface websites.
Kerberos
script kiddie
port scanning
Banner Grabbing
4. A pen testing method where the attacker knows all information about the internal network. It is designed to simulate an attack by a disgruntled systems administrator - or similar level.
keylogger
Access Control List (ACL)
security incident response team (SIRT)
White Box Testing
5. The last portion of the SID that identifies the user to the system in Windows. A RID of 500 identifies the administrator account.
packet filtering
Antivirus (AV) software
RID Resource identifier
Vulnerability
6. A piece of software - provided by the vendor - intended to update or fix known - discovered problems in a computer program or its supporting data.
patch
risk
Mandatory access control (MAC)
Interior Gateway Protocol (IGP)
7. An attack where the hacker repeats a portion of a cryptographic exchange in hopes of fooling the system into setting up a communications channel.
replay attack
false rejection rate (FRR)
-PB
Tiger Team
8. The process of pinging each address within a subnet to map potential targets. Ping sweeps are unreliable and easily detectable - but very fast.
hashing algorithm
ping sweep
-sV
reverse lookup; reverse DNS lookup
9. nmap all output
-PP
Electronic serial number
-oA
Certificate Authority (CA)
10. A storage buffer that transparently stores data so future requests for the same data can be served faster.
ad hoc mode
Defines legal email marketing
File Allocation Table (FAT)
Cache
11. A denial-of-service attack where the attacker sends a ping to the network's broadcast address from the spoofed IP address of the target. All systems in the subnet then respond to the spoofed address - eventually flooding the device.
TACACS
Address Resolution Protocol (ARP) table
Smurf attack
integrity
12. An attack where the hacker positions himself between the client and the server - to intercept (and sometimes alter) data traveling between the two.
Kerberos
Man-in-the-middle attack
-sR
security controls
13. 18 U.S.C. 1029
Possession of access devices
Baseline
false rejection rate (FRR)
Tini
14. A wireless LAN security standard developed by IEEE. Requires Temporal Key Integrity Protocol (TKIP) and Advanced Encryption Standard (AES).
Internet Protocol Security (IPSec) architecture
Asymmetric Algorithm
User Datagram Protocol (UDP)
802.11 i
15. Any kind of connection that allows you to see all traffic passing by. Generally used in reference to a NIDS (network-based IDS) to monitor all traffic.
A S
Computer Emergency Response Team (CERT)
network tap
open source
16. A set of exclusive rights granted by the law of a jurisdiction to the author or creator of an original work - including the right to copy - distribute - and adapt the work.
Institute of Electrical and Electronics Engineers (IEEE)
Address Resolution Protocol (ARP)
port knocking
Copyright
17. A formal set of rules describing data transmission - especially across a network. A protocol determines the type of error checking - the data compression method - how the sending device will indicate completion - how the receiving device will indicat
script kiddie
Macro virus
protocol
routed protocol
18. An attack that exploits the common mistake many people make when installing operating systems
risk
smart card
self encrypting
operating system attack
19. Xmas Tree scan
-sX
File Transfer Protocol (FTP)
-oX
Administratively Prohibited
20. Nmap ml output
Access Creep
Computer Emergency Response Team (CERT)
key exchange protocol
-oX
21. Transmitting one protocol encapsulated inside another protocol.
Simple Object Access Protocol (SOAP)
Electronic Code Book (ECB)
Zenmap
Tunneling
22. Access by information systems (or users) communicating from outside the information system security perimeter.
Asset
remote access
impersonation
role-based access control
23. The process of attaching a particular protocol header and trailer to a unit of data before transmission on the network. Occurs at layer 2 of the OSI reference model.
SMB
encapsulation
rootkit
shrink-wrap code attacks
24. Hex 10
-PS
Wrapper
A
Bug
25. An application that monitors a computer or network to identify - and prevent - malware. AV is usually signature-based - and can take multiple actions on defined malware files/activity.
Antivirus (AV) software
security controls
false negative
packet filtering
26. A self-replicating - self-propagating - self-contained program that uses networking mechanisms to spread itself.
Worm
Methodology
Wi-Fi
Request for Comments (RFC)
27. An enumeration technique used to provide information about a computer system; generally used for operating system identification (also known as fingerprinting).
Banner Grabbing
Antivirus (AV) software
Tunneling Virus
risk
28. A type of DNS transfer - where all records from an SOA are transmitted to the requestor. Zone transfers have two options: full (opcode AXFR) and incremental (IXFR).
integrity
Fraud and related activity in connection with computers
Zone transfer
-p <port ranges>
29. A brand name of analog scrambling and de-scrambling equipment for cable and satellite television - invented primarily to keep consumer Television receive-only (TVRO) satellite equipment from receiving TV programming except on a subscription basis.
symmetric algorithm
Possession of access devices
Videocipher II Satellite Encryption System
Asymmetric
30. A connectionless - layer 4 transport protocol. UDP is faster than TCP - but offers no reliability. A best effort is made to deliver the data - but no checks and verifications are performed to guarantee delivery. Therefore - UDP is termed a 'connectio
public key
gray hat
User Datagram Protocol (UDP)
Self Replicating
31. A computer virus that infects and spreads in multiple ways.
Multipartite virus
sniffer
Extensible Authentication Protocol (EAP)
Antivirus (AV) software
32. The process of systematically testing each port on a firewall to map rules and determine accessible ports.
HTTP tunneling
firewalking
Corrective Controls
Acknowledgment (ACK)
33. A mode of operation in a wireless LAN in which clients send data directly to one another without utilizing a wireless access point (WAP) - much like a point-to-point wired connection.
Worm
physical security
ad hoc mode
Malware
34. A stand-alone computer - kept off the network - that is used for scanning potentially malicious media or software.
Cracker
sheepdip
Fiber Distributed Data Interface (FDDI)
Secure Sockets Layer (SSL)
35. Unauthorized access to information such as a calendar - contact list - e-mails - and text messages on a wireless device through a Bluetooth connection.
gap analysis
Open System Interconnection (OSI) Reference Model
Bluesnarfing
Destination Unreachable
36. A widely used authentication protocol developed at the MassachusettsInstitute of Technology (MIT). Kerberos authentication uses tickets - Ticket Granting Service - and Key Distribution Center.
risk acceptance
FTP
Cryptography
Kerberos
37. A section or subset of the network. Often a router or other routing device provides the end point of the segment.
segment
Detective Controls
Ethical Hacker
No previous knowledge of the network
38. A business - government agency - or educational institution that provides access to the Internet.
NT LAN Manager (NTLM)
Multipurpose Internet Mail Extensions (MIME)
Internet service provider (ISP)
steganography
39. A value assigned to uniquely identify a single wide area network (WAN) in wireless LANs. SSIDs are broadcast by default - and are sent in the header of every packet. SSIDs provide no encryption or security.
Service Set Identifier (SSID)
NetBSD
replay attack
Rijndael
40. The rate at which a biometric system will incorrectly reject an access attempt by an authorized user.
gateway
Exploit
false rejection rate (FRR)
Vulnerability
41. The transmission of digital signals without precise clocking or synchronization.
fully qualified domain name (FQDN)
A S
asynchronous transmission
Zombie
42. A free and popular version of the Unix operating system.
FreeBSD
pattern matching
No previous knowledge of the network
INFOSEC Assessment Methodology (IAM)
43. A nonnumerical - subjective risk evaluation. Used with qualitative assessment (an evaluation of risk that results in ratings of none - low - medium - and high for the probability.)
social engineering
hashing algorithm
qualitative analysis
S
44. A self-replicating malicious program that attempts installation beneath antivirus software by directly intercepting the interrupt handlers of the operating system to evade detection.
Computer Emergency Response Team (CERT)
Time To Live (TTL)
Tunneling Virus
Asynchronous
45. The steps taken to gather evidence and information on the targets you wish to attack.
reconnaissance
Client
Port Address Translation (PAT)
ping sweep
46. The basis of this kind of security is that an individual user - or program operating on the user's behalf - is allowed to specify explicitly the types of access other users (or programs executing on their behalf) may have to information under the use
Address Resolution Protocol (ARP)
Vulnerability Scanning
Discretionary Access Control (DAC)
Extensible Authentication Protocol (EAP)
47. Security identifier. The method by which Windows identifies user - group - and computer accounts for rights and permissions.
SID
Countermeasures
packet
Data Link layer
48. A fully qualified domain name consists of a host and domain name - including a top-level domain such as .com - .net - .mil - .edu -and so on.
fully qualified domain name (FQDN)
public key infrastructure (PKI)
parallel scan & 75 sec timeout & 0.3 sec/probe
stream cipher
49. A command that instructs the system processor to do nothing. Many overflow attacks involve stringing several NOP operations together (known as a NOP sled).
-sL
NOP
sidejacking
proxy server
50. A backup facility with the electrical and physical components of a computer facility - but with no computer equipment in place. The site is ready to receive the necessary replacement computer equipment in the event the user has to move from his main
POST
-sU
Blowfish
Cold Site