SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A method for detecting malicious code on a computer where the files are compared to signatures of known viruses stored in a database.
Telnet
signature scanning
Cryptography
public key
2. A connection-oriented - layer 4 protocol for transporting data over network segments. TCP is considered reliable because it guarantees delivery and the proper reordering of transmitted packets. This protocol is used for most long-haul traffic on the
route
Active Fingerprinting
-oG
Transmission Control Protocol (TCP)
3. A penetration test in which the ethical hacker has limited knowledge of the intended target(s). Designed to simulate an internal - but non-systemadministrator-level attack.
gray box testing
Demilitarized Zone (DMZ)
Transmission Control Protocol (TCP)
Ethernet
4. A software license agreement; a contract between the 'licensor' and purchaser establishing the right to use the software.
Directory Traversal
risk acceptance
End User Licensing Agreement (EULA)
Information Technology Security Evaluation Criteria (ITSEC)
5. The monetary loss that can be expected for an asset due to risk over a one-year period. ALE is the product of the annual rate of occurrence (ARO) and the single loss expectancy (SLE). It is mathematically expressed as ALE = ARO
Annualized Loss Expectancy (ALE)
A
physical security
impersonation
6. A virus designed to infect the master boot record.
Bug
self encrypting
asynchronous transmission
Master boot record infector
7. A set of related communications protocols operating together as a group to address communication at some or all of the seven layers of the OSI reference model.
session hijacking
Virus
protocol stack
CNAME record
8. Window Scan
passive attack
Authentication Header (AH)
-PP
-sW
9. In computer security - this is an algorithm that uses separate keys for encryption and decryption.
security bulletins
Mantrap
Asymmetric Algorithm
network tap
10. Layer 2 of the OSI reference model. This layer provides reliable transit of data across a physical link. The Data Link layer is concerned with physical addressing - network topology - access to the network medium - error detection - sequential delive
Data Link layer
SID
Wi-Fi Protected Access (WPA)
Tumbling
11. An evaluation consisting of a document review - interviews - and demonstrations - as well as vulnerability scans and hands-on testing.
intrusion detection system (IDS)
Active Attack
Event
Level II assessment
12. Safeguards or countermeasures to avoid - counteract - or minimize security risks.
security controls
network tap
reverse lookup; reverse DNS lookup
CIA triangle
13. A piece of code intentionally inserted into a software system that will perform a malicious function when specified conditions are met at some future point.
sidejacking
Vulnerability
Zombie
logic bomb
14. FIN Scan
Trojan Horse
Telnet
Domain Name System (DNS)
-sF
15. A symmetric key cryptographic algorithm that transforms a block of information at a time using a cryptographic key. For a block cipher algorithm - the length of the input block is the same as the length of the output block.
Fast Ethernet
NetBus
Block Cipher
Network Basic Input/Output System (NetBIOS)
16. A set of hardware - software - people - policies - and procedures needed to create - manage - distribute - use - store - and revoke digital certificates.
Kerberos
public key infrastructure (PKI)
Domain Name System (DNS)
Bluejacking
17. The process of a system providing a fully qualified domain name (FQDN) to a local name server - for resolution to its corresponding IP address.
Domain Name System (DNS) lookup
Black Hat
fragmentation
Bastion host
18. The art and science of creating a covert message or image within another message - image - audio - or video file.
Internet Protocol (IP)
RID Resource identifier
packet filtering
steganography
19. An evaluation consisting of a document review - interviews - and demonstrations. No hands-on testing is performed.
script kiddie
Level I assessment
-sX
Hierarchical File System (HFS)
20. An organization's threshold for the seven areas of information security responsibility. This level is established based on the objectives for maintaining confidentiality - integrity - and availability of the organization's IT assets and infrastructur
hash
Threat
Collision Domain
Minimum acceptable level of risk
21. An e-mail message warning users of a nonexistent virus and encouraging them to pass on the message to other users.
-sL
Virus Hoax
Internet Control Message Protocol (ICMP)
Trusted Computer System Evaluation Criteria (TCSEC)
22. A social-engineering attack using computer resources - such as e-mail or IRC.
Computer-Based Attack
Demilitarized Zone (DMZ)
penetration testing
iris scanner
23. An electronic version of junk mail. Unsolicited commercial e-mail sent to numerous recipients.
spam
Wi-Fi
Level II assessment
Secure Multipurpose Mail Extension (S/MIME)
24. A measurable - physical characteristic used to recognize the identity - or verify the claimed identity - of an applicant. Facial images - fingerprints - and handwriting samples are all examples of biometrics.
Biometrics
FreeBSD
Virus Hoax
Last In First Out (LIFO)
25. A condition that occurs when more data is written to a buffer than it has space to store - and results in data corruption or other system errors. This is usually due to insufficient bounds checking - a bug - or improper configuration in the program c
-PP
private key
No previous knowledge of the network
Buffer Overflow
26. The potential for damage to or loss of an IT asset
Daisy Chaining
risk
reconnaissance
-sA
27. 1. The path a packet travels to reach the intended destination. Each individual device along the path traveled is called a hop. 2. Information contained on a device containing instructions for reaching other nodes on the network. This information can
public key
payload
route
Written Authorization
28. A list of IP addresses and corresponding MAC addresses stored on a local computer.
Three-Way (TCP) Handshake
protocol stack
Defense in Depth
Address Resolution Protocol (ARP) table
29. A group of penetration testers that assess the security of an organization - which is often unaware of the existence of the team or the exact assignment.
initial sequence number (ISN)
Backdoor
red team
Algorithm
30. Injecting traffic into the network to identify the operating system of a device.
Console Port
Active Fingerprinting
NT LAN Manager (NTLM)
Simple Mail Transfer Protocol (SMTP)
31. A programming principle whereby the last piece of data added to the stack is the first piece of data taken off.
self encrypting
Domain Name
A series of messages sent by someone attempting to break into a computer to learn about the computer's network services.
Last In First Out (LIFO)
32. Formal description and evaluation of the vulnerabilities in an information system
Ciphertext
reverse social engineering
audit
Vulnerability Assessment
33. Attacks that take advantage of the built-in code and scripts most off-the-shelf applications come with.
protocol stack
Internet Protocol Security (IPSec) architecture
shrink-wrap code attacks
rootkit
34. Management policy and procedures designed to maintain or restore business operations - including computer operations - possibly at an alternate location - in the event of emergencies - system failures - or disaster.
TACACS
remote procedure call (RPC)
Contingency Plan
piggybacking
35. A hardware device used to log keystrokes covertly. Hardware keystroke loggers are very dangerous due to the fact that they cannot be detected through regular software/anti-malware scanning.
hardware keystroke logger
Hypertext Transfer Protocol Secure (HTTPS)
network access server
Syslog
36. A virus that plants itself in a system's boot sector and infects the master boot record.
Boot Sector Virus
Request for Comments (RFC)
Asymmetric
Internet Protocol Security (IPSec) architecture
37. The process of sending a packet or frame toward the destination. In a switch - messages are forwarded only to the port they are addressed to.
Level III assessment
Directory Traversal
forwarding
Copyright
38. The steps taken to gather evidence and information on the targets you wish to attack.
Buffer
reconnaissance
protocol
Point-to-Point Tunneling Protocol (PPTP)
39. CAN-SPAM
Transport Layer Security (TLS)
Internet Assigned Number Authority (IANA)
rogue access point
Defines legal email marketing
40. The central part of a computer or communications system hardware firmware - and software that implements the basic security procedures for controlling access to system resources.
security kernel
Discretionary Access Control (DAC)
802.11
Hierarchical File System (HFS)
41. White hat
Computer-Based Attack
logic bomb
Authentication - Authorization - and Accounting (AAA)
Hacks with permission
42. A method of permitting only MAC addresses in a preapproved list network access. Addresses not matching are blocked.
Kerberos
MAC filtering
EDGAR database
spoofing
43. Access by information systems (or users) communicating from outside the information system security perimeter.
remote access
security by obscurity
Time Bomb
SYN attack
44. A standard that provides best-practice recommendations on information security management for use by those responsible for initiating - implementing - or maintaining Information Security Management Systems (ISMS). Information security is defined with
Simple Network Management Protocol (SNMP)
sniffer
Finding a directory listing and gaining access to a parent or root file for access to other files
ISO 17799
45. The act of searching for Wi-Fi wireless networks by a person in a moving vehicle - using a portable device.
Ciphertext
promiscuous mode
routed protocol
War Driving
46. 18 U.S.C. 1030
Fraud and related activity in connection with computers
phishing
HTTP tunneling
Traceroute
47. A business - government agency - or educational institution that provides access to the Internet.
Buffer Overflow
Internet service provider (ISP)
Time exceeded
Boot Sector Virus
48. A means of restricting access to system resources based on the sensitivity (as represented by a label) of the information contained in the system resource and the formal authorization (that is - clearance) of users to access information of such sensi
Domain Name System (DNS) lookup
false negative
SSH
Mandatory access control (MAC)
49. A set of exclusive rights granted by the law of a jurisdiction to the author or creator of an original work - including the right to copy - distribute - and adapt the work.
Copyright
firewalking
infrastructure mode
promiscuous mode
50. A software or hardware application or device that captures user keystrokes.
false negative
Trusted Computer Base (TCB)
Certificate Authority (CA)
keylogger