SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Calculations of two components of risk: R - the magnitude of the potential loss (L) - and the probability - p - that the loss will occur.
NetBus
Information Technology (IT) infrastructure
NT LAN Manager (NTLM)
quantitative risk assessment
2. Start of Authority record. This record identifies the primary name server for the zone. The SOA record contains the host name of the server responsible for all DNS records within the namespace - as well as the basic properties of the domain.
SOA record
protocol stack
End User Licensing Agreement (EULA)
Tunneling
3. SYN Ping
honeynet
-PS
risk acceptance
Threat
4. Literally - 'not balanced or the same.' In computing - asymmetric refers to a difference in networking speeds upstream to downstream. In cryptography - it's the use of more than one key for encryption/authentication purposes.
Backdoor
Asymmetric
false rejection rate (FRR)
human-based social engineering
5. A set of hardware - software - people - policies - and procedures needed to create - manage - distribute - use - store - and revoke digital certificates.
route
Kerberos
Target Of Engagement (TOE)
public key infrastructure (PKI)
6. A communications path - such as the Internet - authorized for data transmission within a computer system or network.
overt channel
Target Of Engagement (TOE)
Collision Domain
intrusion prevention system (IPS)
7. Hex 14
proxy server
R
A R
local area network (LAN)
8. A group of experts that handles computer security incidents.
security incident response team (SIRT)
remote access
-PB
Demilitarized Zone (DMZ)
9. Name given to expert groups that handle computer security incidents.
Internet Protocol (IP)
Trusted Computer Base (TCB)
physical security
Computer Emergency Response Team (CERT)
10. The process of determining if a network entity (user or service) is legitimate
fully qualified domain name (FQDN)
Authentication
Banner Grabbing
Time To Live (TTL)
11. A class of algorithms for cryptography that use the same cryptographic key for both decryption and encryption.
symmetric algorithm
Cracker
John the Ripper - LOphtcrack - Ophtcrack - Cain and Abel
Contingency Plan
12. A command used in HTTP and FTP to retrieve a file from a server.
DNS enumeration
GET
security bulletins
Crossover Error Rate (CER)
13. Also known as the dot-dot-slash attack. Using directory traversal - the attacker attempts to access restricted directories and execute commands outside intended web server directories by using the URL to redirect to an unintended folder location.
risk assessment
Wired Equivalent Privacy (WEP)
SID
Directory Traversal
14. A hacker who aims to bring down critical infrastructure for a 'cause' and does not worry about the penalties associated with his actions.
Port Address Translation (PAT)
suicide hacker
nslookup
separation of duties
15. An evaluation consisting of a document review - interviews - and demonstrations. No hands-on testing is performed.
FTP
Tunnel
Level I assessment
protocol stack
16. A method used to prevent IDS detection by dividing the request into multiple parts that are sent in different packets
Covert Channel
symmetric algorithm
session splicing
Computer Emergency Response Team (CERT)
17. The conveying of official access or legal power to a person or entity.
Finger
hardware keystroke logger
Authorization
Copyright
18. Monitoring of telephone or Internet conversations - typically by covert means.
Fiber Distributed Data Interface (FDDI)
Wiretapping
Denial of Service (DoS)
Eavesdropping
19. Safeguards or countermeasures to avoid - counteract - or minimize security risks.
Hacks without permission
Blowfish
security controls
Asynchronous
20. A portion of memory used to temporarily store output or input data.
Buffer
Packet Internet Groper (ping)
Methodology
firewall
21. Software that has advertisements embedded within. Generally displays ads in the form of pop-ups.
POP 3
MAC filtering
Adware
impersonation
22. A comparison metric for different biometric devices and technologies; the point at which the false acceptance rate (FAR) equals the
public key infrastructure (PKI)
Crossover Error Rate (CER)
Domain Name System (DNS)
red team
23. A standard that provides best-practice recommendations on information security management for use by those responsible for initiating - implementing - or maintaining Information Security Management Systems (ISMS). Information security is defined with
File Transfer Protocol (FTP)
ISO 17799
Demilitarized Zone (DMZ)
false rejection rate (FRR)
24. A type of encryption where the same key is used to encrypt and decrypt the message.
symmetric encryption
Real application encompassing Trojan
payload
Tunneling Virus
25. Unauthorized access to information such as a calendar - contact list - e-mails - and text messages on a wireless device through a Bluetooth connection.
open source
Destination Unreachable
GET
Bluesnarfing
26. Microsoft SID 500
Unicode
security bulletins
SOA record
Local Administrator
27. A series of documents and notes on standards used or proposed for use on the Internet; each is identified by a number.
Request for Comments (RFC)
Decryption
keylogger
POP 3
28. Directing a protocol from one port to another.
service level agreements (SLAs)
Hacks without permission
port redirection
Competitive Intelligence
29. Port 110
False Acceptance Rate (FAR)
CNAME record
POP 3
Brute-Force Password Attack
30. The combination of all IT assets - resources - components - and systems.
hybrid attack
serialize scans & 0.4 sec wait
Information Technology (IT) infrastructure
router
31. A program designed to execute at a specific time to release malicious code onto the computer system or network.
CIA triangle
Man-in-the-middle attack
Time Bomb
packet filtering
32. A backup facility with the electrical and physical components of a computer facility - but with no computer equipment in place. The site is ready to receive the necessary replacement computer equipment in the event the user has to move from his main
Hierarchical File System (HFS)
site survey
POP 3
Cold Site
33. The process of attaching a particular protocol header and trailer to a unit of data before transmission on the network. Occurs at layer 2 of the OSI reference model.
-PT
Post Office Protocol 3 (POP3)
Trusted Computer Base (TCB)
encapsulation
34. A form of fraud in which someone pretends to be someone else by assuming that person's identity - typically in order to access resources or obtain credit and other benefits in that person's name.
Acceptable Use Policy (AUP)
End User Licensing Agreement (EULA)
identity theft
service level agreements (SLAs)
35. A technology that establishes a tunnel to create a private - dedicated - leased-line network over the Internet. The data is encrypted so it's readable only by the sender and receiver. Companies commonly use VPNs to allow employees to connect securely
-PP
Virtual Private Network (VPN)
reverse social engineering
Secure Multipurpose Mail Extension (S/MIME)
36. Xmas Tree scan
CNAME record
Trapdoor Function
-sX
security kernel
37. Self-contained network with a limited number of participants who extend limited trust to one another in order to accomplish an agreed-upon goal.
routed protocol
intranet
-sT
Console Port
38. Sending packets or requests to another system to gain information to be used to identify weaknesses and protect the system from attacks.
Vulnerability Scanning
Vulnerability Management
ping sweep
replay attack
39. Provides data encryption for IEEE 802.11 wireless networks so data can only be decrypted by the intended recipients.
service level agreements (SLAs)
Wi-Fi Protected Access (WPA)
Archive
Active Attack
40. A limited-function version of the Internetworking Operating System (IOS) - held in read-only memory in some earlier models of Cisco devices - capable of performing several seldom-needed low-level functions such as loading a new IOS into Flash memory
security controls
parameter tampering
asynchronous transmission
RxBoot
41. A domain composed of all the systems sharing any given physical transport media. Systems within a collision domain may collide with each other during the transmission of data. Collisions can be managed by CSMA/CD (collision detection) or CSMA/CA (col
Collision Domain
War Chalking
Client
Secure Sockets Layer (SSL)
42. The ability to trace actions performed on a system to a specific user or system entity.
Accountability
Mandatory access control (MAC)
File Allocation Table (FAT)
source routing
43. Layer 7 of the OSI reference model. The Application layer provides services to applications - which allow them access to the network. Protocols such as FTP and SMTP reside here.
Asymmetric
Internet Protocol (IP)
Application Layer
TACACS
44. Evaluation in which testers attempt to penetrate the network.
Level III assessment
Audit Trail
-sT
inference attack
45. The act of secretly listening to the private conversations of others without their consent. This can also be done over telephone lines (wiretapping) - e-mail - instant messaging - and other methods of communication considered private
forwarding
Eavesdropping
Tunneling
Anonymizer
46. Port 137/138/139
SMB
Wi-Fi Protected Access (WPA)
Echo Reply
Eavesdropping
47. A string used for authentication in SNMP. The public community string is used for read-only searches - whereas the private community string is used for read/write. Community strings are transmitted in clear text in SNMPv1. SNMPv3 provides encryption
Competitive Intelligence
Password Authentication Protocol (PAP)
Auditing
Community String
48. Hashing algorithm that results in a 128-bit output.
Collision Domain
-sL
Wired Equivalent Privacy (WEP)
MD5
49. A set of rules defined by a system administrator that indicates whether access is allowed or denied to resource objects.
404EE
Buffer
steganography
rule-based access control
50. A value assigned to uniquely identify a single wide area network (WAN) in wireless LANs. SSIDs are broadcast by default - and are sent in the header of every packet. SSIDs provide no encryption or security.
Block Cipher
Service Set Identifier (SSID)
remote access
packet filtering