SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A method of evaluating the security of a computer system or network by simulating an attack from a malicious source.
penetration testing
pattern matching
Discretionary Access Control (DAC)
File Allocation Table (FAT)
2. A remote control program in which the client runs on a local computer and connects to a remote server on a network. Commands entered locally are executed on the remote system.
fully qualified domain name (FQDN)
Telnet
Access Control List (ACL)
port knocking
3. Injecting traffic into the network to identify the operating system of a device.
Active Fingerprinting
Local Administrator
Exposure Factor
hybrid attack
4. The rate at which a biometric system will incorrectly identify an unauthorized individual and allow them access (see false negative).
CAM table
Cracker
Auditing
False Acceptance Rate (FAR)
5. A VPN tunneling protocol with encryption. PPTP connects two nodes in a VPN by using one TCP port for negotiation and authentication and one IP protocol for data transfer.
Transmission Control Protocol (TCP)
Point-to-Point Tunneling Protocol (PPTP)
Wi-Fi
Mantrap
6. A technology that establishes a tunnel to create a private - dedicated - leased-line network over the Internet. The data is encrypted so it's readable only by the sender and receiver. Companies commonly use VPNs to allow employees to connect securely
public key infrastructure (PKI)
port scanning
Virtual Private Network (VPN)
A S
7. A network deployed as a trap to detect - deflect - or deter unauthorized use of information systems.
honeynet
Simple Object Access Protocol (SOAP)
Computer-Based Attack
port knocking
8. A group of experts that handles computer security incidents.
Assessment
Malicious code
Service Set Identifier (SSID)
security incident response team (SIRT)
9. Controlling access to a network by analyzing the headers of incoming and outgoing packets - and letting them pass or discarding them based on rule sets created by a network administrator. A packet filter allows or denies packets based on destination
Malware
Lightweight Directory Access Protocol (LDAP)
Blowfish
packet filtering
10. The lack of clocking (imposed time ordering) on a bit stream.
risk
Asynchronous
Target Of Engagement (TOE)
Tunnel
11. The Security Accounts Manager file in Windows stores all the password hashes for the system.
SAM
net use \[target ip]IPC$ '' /user:''
Ciphertext
-sP
12. An Ethernet networking system transmitting data at 100 million bits per second (Mbps) - 10 times the speed of an earlier Ethernet standard. Derived from the Ethernet 802.3 standard - it is also known as 100BaseT.
Fast Ethernet
risk transference
SOA record
single loss expectancy (SLE)
13. Evaluation in which testers attempt to penetrate the network.
Post Office Protocol 3 (POP3)
-oG
Level III assessment
risk transference
14. A protocol used to pass control and error messages between nodes on the Internet.
Internet Protocol (IP)
Internet Control Message Protocol (ICMP)
Trusted Computer System Evaluation Criteria (TCSEC)
risk avoidance
15. A self-replicating malicious program that attempts installation beneath antivirus software by directly intercepting the interrupt handlers of the operating system to evade detection.
Tunneling Virus
remote procedure call (RPC)
Warm Site
Lightweight Directory Access Protocol (LDAP)
16. A formal set of rules describing data transmission - especially across a network. A protocol determines the type of error checking - the data compression method - how the sending device will indicate completion - how the receiving device will indicat
protocol
remote access
Block Cipher
Administratively Prohibited
17. The process of sending a packet or frame toward the destination. In a switch - messages are forwarded only to the port they are addressed to.
Worm
symmetric encryption
Authorization
forwarding
18. An outdated symmetric cipher encryption algorithm - previously U.S. government-approved and used by business and civilian government agencies. DES is no longer considered secure due to the ease with which the entire keyspace can be attempted using mo
Data Encryption Standard (DES)
INFOSEC Assessment Methodology (IAM)
infrastructure mode
Brute-Force Password Attack
19. A suite of protocols used for securing Internet Protocol (IP) communications by authenticating and encrypting each IP packet of a communication session. This suite includes protocols for establishing mutual authentication between agents at the sessio
rule-based access control
protocol stack
Internet Protocol Security (IPSec) architecture
Address Resolution Protocol (ARP) table
20. Actions - devices - procedures - techniques - or other measures intended to reduce the vulnerability of an information system.
Countermeasures
Black Hat
SYN attack
Common Internet File System/Server Message Block
21. The act of using numerous electronic serial numbers on a cell phone until a valid number is located.
Media Access Control (MAC)
Three-Way (TCP) Handshake
Tumbling
integrity
22. A condition that occurs when more data is written to a buffer than it has space to store - and results in data corruption or other system errors. This is usually due to insufficient bounds checking - a bug - or improper configuration in the program c
Virus Hoax
Buffer Overflow
Denial of Service (DoS)
Internet Protocol Security (IPSec) architecture
23. A domain composed of all the systems sharing any given physical transport media. Systems within a collision domain may collide with each other during the transmission of data. Collisions can be managed by CSMA/CD (collision detection) or CSMA/CA (col
Acknowledgment (ACK)
Defines legal email marketing
gap analysis
Collision Domain
24. Port 80/81/8080
NetBSD
Defines legal email marketing
HTTP
patch
25. The basis of this kind of security is that an individual user - or program operating on the user's behalf - is allowed to specify explicitly the types of access other users (or programs executing on their behalf) may have to information under the use
Discretionary Access Control (DAC)
symmetric algorithm
Bit Flipping
Smurf attack
26. A number assigned during TCP startup sessions that tracks how much information has been moved. This number is used by hackers when hijacking sessions.
nslookup
initial sequence number (ISN)
Transmission Control Protocol (TCP)
iris scanner
27. A Windows-based GUI version of nmap.
session hijacking
Reconnaissance - Scanning - Gaining Access - Maintaining Access - Covering Tracks
File Transfer Protocol (FTP)
Zenmap
28. Using conversation or some other interaction between people to gather useful information.
Request for Comments (RFC)
human-based social engineering
Information Technology (IT) security architecture and framework
spam
29. TCP connect() scan
Active Directory (AD)
script kiddie
-sT
Worm
30. A trusted entity that issues and revokes public key certificates. In a network - a CA is a trusted entity that issues - manages - and revokes security credentials and public keys for message encryption and/or authentication. Within a public key infra
encapsulation
Certificate Authority (CA)
Hypertext Transfer Protocol (HTTP)
Competitive Intelligence
31. A fully operational off-site data-processing facility equipped with hardware and system software to be used in the event of a disaster.
Domain Name System (DNS)
steganography
secure channel
hot site
32. A simple PPP authentication mechanism in which the user name and password are transmitted in clear text to prove identity. PAP compares the user name and password to a table listing authorized users.
remote access
-oX
Password Authentication Protocol (PAP)
Level III assessment
33. A means of restricting access to system resources based on the sensitivity (as represented by a label) of the information contained in the system resource and the formal authorization (that is - clearance) of users to access information of such sensi
parallel scan & 300 sec timeout & 1.25 sec/probe
fully qualified domain name (FQDN)
Mandatory access control (MAC)
inference attack
34. A stand-alone computer - kept off the network - that is used for scanning potentially malicious media or software.
Asymmetric Algorithm
sheepdip
XOR Operation
Hacks without permission
35. A means of exchanging information from one entity to another using a process that does not provide an attacker the opportunity to reorder - delete - insert - or read information.
Finger
Asset
secure channel
Last In First Out (LIFO)
36. Transmitting one protocol encapsulated inside another protocol.
patch
Authorization
Audit Trail
Tunneling
37. An attack with the goal of preventing authorized users from accessing services and preventing the normal operation of computers and networks.
Block Cipher
port scanning
Denial of Service (DoS)
Computer-Based Attack
38. Port 22
Access Control List (ACL)
SSH
hash
Worm
39. A computer placed outside a firewall to provide public services to other Internet sites - and hardened to resist external attacks.
Filter
Asymmetric
Collision
Bastion host
40. A utility that sends an ICMP Echo message to determine if a specific IP address is accessible; if the message receives a reply - the address is reachable.
Packet Internet Groper (ping)
-PI
Digital Certificate
human-based social engineering
41. A security protocol for wireless local area networks defined in the 802.11b standard; intended to provide the same level of security as a wired LAN. WEP is not considered strong security - although it does authenticate clients to access points - encr
Wired Equivalent Privacy (WEP)
John the Ripper - LOphtcrack - Ophtcrack - Cain and Abel
Daisy Chaining
File Allocation Table (FAT)
42. A network administration command-line tool available for many operating systems for querying the Domain Name System (DNS) to obtain domain name or IP address mappings or any other specific DNS record.
Open System Interconnection (OSI) Reference Model
Mandatory access control (MAC)
Google hacking
nslookup
43. A Canonical Name record within DNS - used to provide an alias for a domain name.
remote procedure call (RPC)
CNAME record
honeypot
Google hacking
44. Hex 29
File Allocation Table (FAT)
U P F
operating system attack
White Box Testing
45. Establish Null Session
802.11
net use \[target ip]IPC$ '' /user:''
public key infrastructure (PKI)
passive attack
46. A piece of software - provided by the vendor - intended to update or fix known - discovered problems in a computer program or its supporting data.
patch
Real application encompassing Trojan
National Security Agency
War Driving
47. Policy stating what users of a system can and cannot do with the organization's assets.
Simple Mail Transfer Protocol (SMTP)
Acceptable Use Policy (AUP)
HTTP
fully qualified domain name (FQDN)
48. An evaluation conducted to determine the potential for damage to or loss of an IT asset.
Fraud and related activity in connection with computers
risk assessment
Computer-Based Attack
Mantrap
49. FTP Bounce Attack
Point-to-Point Tunneling Protocol (PPTP)
Smurf attack
Trapdoor Function
-b
50. Malware designed to install some sort of virus - backdoor - and so on - on a target system.
Droppers
key exchange protocol
Brute-Force Password Attack
SOA record