SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. An Application layer protocol used by local email clients to retrieve e-mail from a remote server over a TCP/IP connection.
Address Resolution Protocol (ARP)
Web Spider
Post Office Protocol 3 (POP3)
Replacing numbers in a url to access other files
2. Drawing symbols in public places to alert others to an open Wi-Fi network. War chalking can include the SSIDs - administrative passwords to APs - and other information.
War Chalking
The automated process of proactively identifying vulnerabilities of computing systems present in a network
Filter
nslookup
3. Method used by antivirus software to detect new - unknown viruses that have not yet been identified; based on a piece-by-piece examination of a program - looking for a sequence or sequences of instructions that differentiate the virus from 'normal' p
-oN
spam
heuristic scanning
secure channel
4. A record showing which user has accessed a given resource and what operations the user performed during a given period.
hashing algorithm
Audit Trail
integrity
A
5. ICMP Type/Code 3
Buffer Overflow
Destination Unreachable
queue
Internal access to the network
6. The potential for damage to or loss of an IT asset
Level III assessment
risk avoidance
risk
Methodology
7. Port 88
Kerberos
ECHO reply
-sT
replay attack
8. The act of using numerous electronic serial numbers on a cell phone until a valid number is located.
router
S
Asset
Tumbling
9. A value used to control cryptographic operations - such as decryption -encryption - signature generation - and signature verification.
LDAP
port knocking
Cryptographic Key
Finding a directory listing and gaining access to a parent or root file for access to other files
10. The process of embedding information into a digital signal in a way that makes it difficult to remove.
Port Address Translation (PAT)
Digital Watermarking
Kerberos
Virus Hoax
11. A business - government agency - or educational institution that provides access to the Internet.
footprinting
Internet service provider (ISP)
Virtual Private Network (VPN)
shoulder surfing
12. A software or hardware application or device that captures user keystrokes.
Access Control List (ACL)
session splicing
session hijacking
keylogger
13. A remote control program in which the client runs on a local computer and connects to a remote server on a network. Commands entered locally are executed on the remote system.
Wired Equivalent Privacy (WEP)
Covert Channel
Telnet
Internet Protocol Security (IPSec) architecture
14. A utility that sends an ICMP Echo message to determine if a specific IP address is accessible; if the message receives a reply - the address is reachable.
Sign in Seal
null session
Macro virus
Packet Internet Groper (ping)
15. A biometric device that uses pattern-recognition techniques based on images of the irises of an individual's eyes.
private network address
iris scanner
reverse lookup; reverse DNS lookup
identity theft
16. A background process found in Unix - Linux - Solaris - and other Unix-based operating systems.
Daemon
Hierarchical File System (HFS)
Access Creep
Digital Signature
17. A backlog of packets stored in buffers and waiting to be forwarded over an interface.
non-repudiation
integrity
ad hoc mode
queue
18. LM Hash for short passwords (under 7)
404EE
National Security Agency
Serial Line Internet Protocol (SLIP)
End User Licensing Agreement (EULA)
19. A small space having two sets of interlocking doors; the first set of doors must close before the second set opens. Typically authentication is required for each door - often using different factors. For example - a smart card may open the first door
Mantrap
Lightweight Directory Access Protocol (LDAP)
Local Administrator
Black Hat
20. don't ping
Internet Protocol Security (IPSec) architecture
-sO
-P0
Internet Protocol (IP)
21. Wireless LAN standards created by IEEE. 802.11a runs at up to 54Mbps at 5GHz - 802.11b runs at 11Mbps at 2.4GHz - 802.11g runs at 54Mbps at 2.4GHz - and 802.11n can run upwards of 150MBps.
Echo request
Wi-Fi Protected Access (WPA)
Wireless Local Area Network (WLAN)
802.11
22. Security identifier. The method by which Windows identifies user - group - and computer accounts for rights and permissions.
-sW
protocol
SID
-oX
23. CAN-SPAM
Buffer Overflow
Interior Gateway Protocol (IGP)
Wi-Fi
Defines legal email marketing
24. A three-step process computers execute to negotiate a connection with one another. The three steps are SYN - SYN/ACK - ACK.
impersonation
Three-Way (TCP) Handshake
Annualized Loss Expectancy (ALE)
War Chalking
25. A comparison metric for different biometric devices and technologies; the point at which the false acceptance rate (FAR) equals the
Crossover Error Rate (CER)
Hierarchical File System (HFS)
keylogger
Boot Sector Virus
26. A device set up to send a response on behalf of an end node to the requesting host. Proxies are generally used to obfuscate the host from the Internet.
proxy server
-sX
steganography
Internet Control Message Protocol (ICMP)
27. Security measures - such as a locked door - perimeter fence - or security guard - to prevent or deter physical access to a facility - resource - or information stored on physical media.
HTTP tunneling
parallel scan & 75 sec timeout & 0.3 sec/probe
key exchange protocol
physical security
28. Host-based IDS. An IDS that resides on the host - protecting against file and folder manipulation and other host-based attacks and actions.
security defect
HIDS
Hacks with permission
Defines legal email marketing
29. A hardware device used to log keystrokes covertly. Hardware keystroke loggers are very dangerous due to the fact that they cannot be detected through regular software/anti-malware scanning.
Internet Assigned Number Authority (IANA)
hardware keystroke logger
Authentication Header (AH)
Authentication
30. Ping Scan
packet filtering
-sP
rogue access point
Simple Mail Transfer Protocol (SMTP)
31. A social-engineering attack using computer resources - such as e-mail or IRC.
Detective Controls
Black Hat
proxy server
Computer-Based Attack
32. A computer network confined to a relatively small area - such as a single building or campus - in which devices connect through high-frequency radio waves using IEEE standard 802.11.
iris scanner
Wireless Local Area Network (WLAN)
-P0
SOA record
33. A computer placed outside a firewall to provide public services to other Internet sites - and hardened to resist external attacks.
heuristic scanning
Access Creep
CIA triangle
Bastion host
34. Access by information systems (or users) communicating from outside the information system security perimeter.
remote access
packet
Information Technology (IT) asset criticality
Simple Mail Transfer Protocol (SMTP)
35. ICMP Type/Code 3-13
Virus
Administratively Prohibited
Replacing numbers in a url to access other files
--randomize_hosts -O OS fingerprinting
36. A network system of servers that translates numeric Internet Protocol (IP) addresses into human-friendly - hierarchical Internet addresses - and vice versa.
Replacing numbers in a url to access other files
Open System Interconnection (OSI) Reference Model
Trapdoor Function
Domain Name System (DNS)
37. A device on a network.
node
Trusted Computer System Evaluation Criteria (TCSEC)
Syslog
Domain Name
38. The process of determining if a network entity (user or service) is legitimate
Black Hat
Authentication
-sR
network tap
39. A query and response protocol widely used for querying databases that store the registered users or assignees of an Internet resource - such as a domain name - an IP address - or an autonomous system.
quantitative risk assessment
MD5
Vulnerability
Whois
40. Port 80/81/8080
National Security Agency
Defense in Depth
HTTP
segment
41. A nontechnical method of hacking. Social engineering is the art of manipulating people - whether in person (human-based) or via computing methods (computer-based) - into providing sensitive information.
social engineering
parallel scan
human-based social engineering
Cryptography
42. An extensible mechanism for e-mail. A variety of MIME types exist for sending content such as audio - binary - or video using the Simple Mail Transfer Protocol (SMTP).
A
Multipurpose Internet Mail Extensions (MIME)
Audit Trail
Demilitarized Zone (DMZ)
43. Controls internal to a system designed to resolve vulnerabilities and errors soon after they arise.
Corrective Controls
queue
sidejacking
-sO
44. An e-mail protection method using a secret message or image that can be referenced on any official communication with the site; if an e-mail is received without the image or message - the recipient knows it is not legitimate.
patch
TACACS
Sign in Seal
Secure Sockets Layer (SSL)
45. A type 0 ICMP message used to reply to ECHO requests. Used with ping to verify network layer connectivity between hosts.
ECHO reply
Warm Site
Boot Sector Virus
Cookie
46. Activities to determine the extent to which a security control is implemented correctly - operating as intended - and producing the desired outcome with respect to meeting the security requirements for the system.
-sI
Assessment
rogue access point
nslookup
47. A program or piece of code inserted into a system - usually covertly - with the intent of compromising the confidentiality - integrity - or availability of the victim's data - applications - or operating system. Malware consists of viruses - worms -
local area network (LAN)
Malware
Common Internet File System/Server Message Block
Echo request
48. Shifting responsibility from one party to another
phishing
script kiddie
Electronic Code Book (ECB)
risk transference
49. A term representing the responsibility managers and their organizations have to provide information security to ensure the type of control - the cost of control - and the deployment of control are appropriate for the system being managed.
Due Care
Application Layer
Access Creep
Data Encryption Standard (DES)
50. An attack against an authentication protocol in which the attacker intercepts data in transit along the network between the claimant and verifier - but does not alter the data (in other words - eavesdropping).
replay attack
passive attack
Man-in-the-middle attack
Cookie