SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A string that represents the location of a web resource
Transport Layer Security (TLS)
risk
Adware
Uniform Resource Locator (URL)
2. MAC Flooding
Overwhelm CAM table to convert switch to hub mode
operating system attack
Malicious code
private key
3. TCP connect() scan
OpenBSD
-sT
gray box testing
Antivirus (AV) software
4. A type of attack used to deny service to legitimate users of a network resource by intentionally overloading the network with illegitimate TCP connection requests. SYN packets are sent repeatedly to the target - but the corresponding SYN/ACK response
SNMP
Event
SYN flood attack
Information Technology (IT) asset criticality
5. 18 U.S.C. 1029
Possession of access devices
session splicing
Internet Control Message Protocol (ICMP)
SNMP
6. The central part of a computer or communications system hardware firmware - and software that implements the basic security procedures for controlling access to system resources.
network access server
Crossover Error Rate (CER)
-sR
security kernel
7. A group of penetration testers that assess the security of an organization - which is often unaware of the existence of the team or the exact assignment.
War Driving
red team
Audit Data
A S
8. FTP Bounce Attack
-b
Filter
symmetric encryption
Buffer Overflow
9. A hacker who aims to bring down critical infrastructure for a 'cause' and does not worry about the penalties associated with his actions.
Web Spider
802.11
Biometrics
suicide hacker
10. An electronic version of junk mail. Unsolicited commercial e-mail sent to numerous recipients.
Hypertext Transfer Protocol (HTTP)
spam
War Dialing
Bug
11. A function that is easy to compute in one direction - yet believed to be difficult to compute in the opposite direction (finding its inverse) without special information - called the 'trapdoor.' Widely used in cryptography.
Trapdoor Function
phishing
gap analysis
Directory Traversal
12. A fully qualified domain name consists of a host and domain name - including a top-level domain such as .com - .net - .mil - .edu -and so on.
fully qualified domain name (FQDN)
Authorization
Console Port
ring topology
13. Weakness in an information system - system security procedures - internal controls - or implementation that could be exploited or triggered by a threat source.
Vulnerability
hashing algorithm
Due Care
Ethernet
14. A decision to reduce the potential for damage to or loss of an IT asset by taking some type of action
POP 3
risk avoidance
risk
Discretionary Access Control (DAC)
15. Version Detection Scan
HTTP tunneling
-sA
-sV
protocol
16. Shifting responsibility from one party to another
SOA record
Fiber Distributed Data Interface (FDDI)
risk transference
piggybacking
17. The ability to trace actions performed on a system to a specific user or system entity.
false negative
XOR Operation
Accountability
Archive
18. TCP Ping
Extensible Authentication Protocol (EAP)
port scanning
Corrective Controls
-PT
19. TCP SYN Scan
-sS
open source
Secure Multipurpose Mail Extension (S/MIME)
red team
20. An encryption standard designed by Joan Daemen and Vincent Rijmen. Chosen by a NIST contest to be the Advanced Encryption Standard (AES).
Rijndael
War Dialing
Domain Name
Confidentiality
21. A social-engineering effort in which the attacker pretends to be an employee - a valid user - or even an executive to elicit information or access.
No previous knowledge of the network
nslookup
hashing algorithm
impersonation
22. An attack where the hacker manipulates parameters within the URL string in hopes of modifying data.
sniffer
parallel scan
Point-to-Point Tunneling Protocol (PPTP)
parameter tampering
23. Ports 20/21
DNS enumeration
Digital Certificate
Destination Unreachable
FTP
24. The directory service created by Microsoft for use on itsnetworks. Provides a variety of network services using Lightweight Directory Access Protocol (LDAP) - Kerberos-based authentication - and single sign-on for user access to network-based resourc
Ciphertext
Active Directory (AD)
port redirection
Self Replicating
25. A firewall evasion technique whereby packets are wrapped in HTTP - as a covert channel to the target.
remote procedure call (RPC)
HTTP tunneling
rogue access point
hacktivism
26. A form of fraud in which someone pretends to be someone else by assuming that person's identity - typically in order to access resources or obtain credit and other benefits in that person's name.
Simple Mail Transfer Protocol (SMTP)
net use \[target ip]IPC$ '' /user:''
identity theft
A
27. nmap all output
Authorization
gateway
-oA
Simple Network Management Protocol (SNMP)
28. A piece of code intentionally inserted into a software system that will perform a malicious function when specified conditions are met at some future point.
logic bomb
shrink-wrap code attacks
Buffer Overflow
Smurf attack
29. A security tool designed to protect a system or network against attacks by comparing traffic patterns against a list of both known attack signatures and general characteristics of how attacks may be carried out. Threats are rated and protective measu
Local Administrator
intrusion prevention system (IPS)
Time exceeded
Methodology
30. A free and popular version of the Unix operating system.
Unicode
FreeBSD
Traceroute
Telnet
31. A free - open source version of the Berkeley Software Distribution of Unix - often used in embedded systems.
Directory Traversal
risk assessment
NetBSD
spam
32. A piece of software - provided by the vendor - intended to update or fix known - discovered problems in a computer program or its supporting data.
Electronic serial number
patch
Defense in Depth
RID Resource identifier
33. Phases of an attack
node
Reconnaissance - Scanning - Gaining Access - Maintaining Access - Covering Tracks
Zero Subnet
security controls
34. Wireless LAN standards created by IEEE. 802.11a runs at up to 54Mbps at 5GHz - 802.11b runs at 11Mbps at 2.4GHz - 802.11g runs at 54Mbps at 2.4GHz - and 802.11n can run upwards of 150MBps.
802.11
-sU
Information Technology Security Evaluation Criteria (ITSEC)
protocol stack
35. A software or hardware defect that often results in system vulnerabilities.
impersonation
Bug
Address Resolution Protocol (ARP)
Zero Subnet
36. The rate at which a biometric system will incorrectly identify an unauthorized individual and allow them access (see false negative).
queue
routed protocol
False Acceptance Rate (FAR)
Internet Protocol Security (IPSec) architecture
37. The condition of a resource being ready for use and accessible by authorized users.
Buffer Overflow
Level I assessment
Availability
File Transfer Protocol (FTP)
38. A type of DNS transfer - where all records from an SOA are transmitted to the requestor. Zone transfers have two options: full (opcode AXFR) and incremental (IXFR).
Lightweight Directory Access Protocol (LDAP)
segment
Computer Emergency Response Team (CERT)
Zone transfer
39. The public portion of an asymmetric key pair typically used to encrypt data or verify signatures. Public keys are shared and are used to encrypt messages.
session hijacking
Institute of Electrical and Electronics Engineers (IEEE)
public key
honeypot
40. A method of password cracking whereby all possible options are systematically enumerated until a match is found. These attacks try every password (or authentication option) - one after another - until successful. Bruteforce attacks take a long time t
Exposure Factor
Assessment
hybrid attack
Brute-Force Password Attack
41. A routing protocol developed to be used within a single organization.
Secure Sockets Layer (SSL)
Transport Layer Security (TLS)
Digital Watermarking
Interior Gateway Protocol (IGP)
42. An organization composed of engineers - scientists - and students who issue standards related to electrical - electronic - and computer engineering.
Institute of Electrical and Electronics Engineers (IEEE)
remote access
rogue access point
audit
43. A method in cryptography by which cryptographic keys are exchanged between users - allowing use of a cryptographic algorithm (for example - the Diffie-Hellman key exchange).
Kerberos
Countermeasures
key exchange protocol
Last In First Out (LIFO)
44. A wireless access point that has either been installed on a secure company network without explicit authorization from a local network administrator - or has been created to allow a hacker to conduct a man-in-the-middle attack.
rogue access point
hardware keystroke logger
A series of messages sent by someone attempting to break into a computer to learn about the computer's network services.
gateway
45. A sublayer of layer 2 of the OSI model - the Data Link layer. It provides addressing and channel access control mechanisms that enable several terminals or network nodes to communicate within a multipoint network.
Media Access Control (MAC)
symmetric encryption
parameter tampering
-sP
46. All measures and techniques taken to gather information about an intended target. Footprinting can be passive or active.
DNS
Asynchronous
The automated process of proactively identifying vulnerabilities of computing systems present in a network
footprinting
47. An attack where the hacker repeats a portion of a cryptographic exchange in hopes of fooling the system into setting up a communications channel.
replay attack
Defines legal email marketing
port knocking
Data Link layer
48. A value used to control cryptographic operations - such as decryption -encryption - signature generation - and signature verification.
Accountability
polymorphic virus
Cryptographic Key
R
49. A term representing the responsibility managers and their organizations have to provide information security to ensure the type of control - the cost of control - and the deployment of control are appropriate for the system being managed.
Certificate Authority (CA)
POP 3
Due Care
-sW
50. An attack in which the hacker can derive information from the ciphertext without actually decoding it. Sensitive information can be considered compromised if an adversary can infer its real value with a high level of confidence.
polymorphic virus
inference attack
hacktivism
SOA record