SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Layer 7 of the OSI reference model. The Application layer provides services to applications - which allow them access to the network. Protocols such as FTP and SMTP reside here.
Eavesdropping
Information Technology (IT) infrastructure
Database
Application Layer
2. A file system used by the Mac OS.
Vulnerability Scanning
Serial Line Internet Protocol (SLIP)
Hierarchical File System (HFS)
No previous knowledge of the network
3. Metamorphic Virus
-PP
flood
Self Replicating
penetration testing
4. A method of network traffic filtering that monitors the entire communications process - including the originator of the session and from which direction it started.
Demilitarized Zone (DMZ)
U P F
stateful packet filtering
Algorithm
5. The science or study of protecting information - whether in transit or at rest - by using techniques to render the information unusable to anyone who does not possess the means to decrypt it.
human-based social engineering
Anonymizer
Cryptography
network interface card (NIC)
6. An electronic version of junk mail. Unsolicited commercial e-mail sent to numerous recipients.
hashing algorithm
Virus
spam
key exchange protocol
7. Freely and readily available information on an organization that can be gathered by a business entity about its competitor's customers - products - and marketing - and can be used by an attacker to build useful information for further attacks.
Simple Network Management Protocol (SNMP)
Competitive Intelligence
hot site
network interface card (NIC)
8. Software used to bind a Trojan and a legitimate program together so the Trojan will be installed when the legitimate program is executed.
Wrapper
Database
Collision Domain
false rejection rate (FRR)
9. An organization's threshold for the seven areas of information security responsibility. This level is established based on the objectives for maintaining confidentiality - integrity - and availability of the organization's IT assets and infrastructur
Audit Trail
personal identification number (PIN)
Minimum acceptable level of risk
ad hoc mode
10. Management policy and procedures designed to maintain or restore business operations - including computer operations - possibly at an alternate location - in the event of emergencies - system failures - or disaster.
Backdoor
Contingency Plan
hardware keystroke logger
S
11. A connection-oriented - layer 4 protocol for transporting data over network segments. TCP is considered reliable because it guarantees delivery and the proper reordering of transmitted packets. This protocol is used for most long-haul traffic on the
Point-to-Point Protocol (PPP)
Transmission Control Protocol (TCP)
Active Attack
overt channel
12. A business - government agency - or educational institution that provides access to the Internet.
Internet service provider (ISP)
Digital Certificate
Overwhelm CAM table to convert switch to hub mode
Tini
13. Port 23
Telnet
Minimum acceptable level of risk
-b
Copyright
14. Computer software or hardware that can intercept and log traffic passing over a digital network.
No previous knowledge of the network
NOP
Due Diligence
sniffer
15. An HTTP command to transmit text to a web server for processing. The opposite of an HTTP GET.
POST
asynchronous transmission
Authentication - Authorization - and Accounting (AAA)
Hacks without permission
16. A wireless LAN device that acts as a central point for all wireless traffic. The AP is connected to both the wireless LAN and the wired LAN - providing wireless clients access to network resources.
Worm
Filter
RPC-DCOM
Access Point (AP)
17. Xmas Tree scan
-sX
Tini
CNAME record
hardware keystroke logger
18. The last portion of the SID that identifies the user to the system in Windows. A RID of 500 identifies the administrator account.
enumeration
sniffer
RID Resource identifier
-oX
19. A list of IP addresses and corresponding MAC addresses stored on a local computer.
encapsulation
Address Resolution Protocol (ARP) table
RPC-DCOM
Authentication
20. A method for detecting malicious code on a computer where the files are compared to signatures of known viruses stored in a database.
firewalking
signature scanning
Trojan Horse
Black Box Testing
21. Injecting traffic into the network to identify the operating system of a device.
Electronic serial number
Replacing numbers in a url to access other files
Active Fingerprinting
shrink-wrap code attacks
22. The conveying of official access or legal power to a person or entity.
-PB
role-based access control
Authorization
-sO
23. A fully operational off-site data-processing facility equipped with hardware and system software to be used in the event of a disaster.
firewalking
hot site
Kerberos
SOA record
24. A collection of historical records or the place where they are kept. In computing - an archive generally refers to backup copies of logs and/or data.
Directory Traversal
self encrypting
CNAME record
Archive
25. A partially protected zone on a network - not exposed to the full fury of the Internet - but not fully behind the firewall. This technique is typically used on parts of the network that must remain open to the public (such as a web server) but must a
limitation of liability and remedies
Asset
Demilitarized Zone (DMZ)
Event
26. An unknown deficiency in software or some other product that results in a security vulnerability being identified.
Common Internet File System/Server Message Block
NetBSD
HTTP tunneling
security defect
27. An attack that is direct in nature - usually where the attacker injects something into - or otherwise alters - the network or system target.
Discretionary Access Control (DAC)
Internet Protocol (IP)
Active Attack
Temporal Key Integrity Protocol (TKIP)
28. ICMP Ping
passive attack
-PI
RxBoot
Buffer Overflow
29. A cyber attacker who acts without permission from - and gives prior notice to - the resource owner. Also known as a malicious hacker.
hybrid attack
Asynchronous
Cracker
social engineering
30. An adapter that provides the physical connection to send and receive data between the computer and the network media.
HTTP tunneling
polymorphic virus
network interface card (NIC)
Whois
31. A skilled hacker that straddles the line between white hat (hacking only with permission and within guidelines) and black hat (malicious hacking for personal gain). Gray hats sometime perform illegal acts to exploit technology with the intent of achi
Local Administrator
Virtual Local Area Network (VLAN)
gray hat
Post Office Protocol 3 (POP3)
32. A backlog of packets stored in buffers and waiting to be forwarded over an interface.
Sign in Seal
Media Access Control (MAC)
queue
serial scan & 300 sec wait
33. A hardware device used to log keystrokes covertly. Hardware keystroke loggers are very dangerous due to the fact that they cannot be detected through regular software/anti-malware scanning.
hardware keystroke logger
Asymmetric
Minimum acceptable level of risk
Malware
34. Hex 12
Threat
A S
Malware
Cache
35. Sending unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobile phones - PDAs - or laptop computers.
network operations center (NOC)
Bluejacking
Rijndael
Blowfish
36. Host-based IDS. An IDS that resides on the host - protecting against file and folder manipulation and other host-based attacks and actions.
HIDS
Asymmetric
Lightweight Directory Access Protocol (LDAP)
-sT
37. An attack against an authentication protocol in which the attacker intercepts data in transit along the network between the claimant and verifier - but does not alter the data (in other words - eavesdropping).
Cryptography
passive attack
802.11 i
Traceroute
38. A background process found in Unix - Linux - Solaris - and other Unix-based operating systems.
security defect
security incident response team (SIRT)
audit
Daemon
39. A suite of protocols used for securing Internet Protocol (IP) communications by authenticating and encrypting each IP packet of a communication session. This suite includes protocols for establishing mutual authentication between agents at the sessio
Internet Protocol Security (IPSec) architecture
-sP
Tunneling Virus
Common Internet File System/Server Message Block
40. An Internet Protocol Security (IPSec) header used to verify that the contents of a packet have not been modified while the packet was in transit.
Authentication Header (AH)
Assessment
Ciphertext
reverse social engineering
41. A point of reference used to mark an initial state in order to manage change.
Baseline
hardware keystroke logger
False Acceptance Rate (FAR)
script kiddie
42. A protocol defining packets that are able to be routed by a router.
Hypertext Transfer Protocol Secure (HTTPS)
Tunnel
POP 3
routed protocol
43. Software or hardware components that restrict access between a protected network and the Internet - or between other sets of networks - to block unwanted use or attacks.
Demilitarized Zone (DMZ)
forwarding
firewall
ad hoc mode
44. A network administration command-line tool available for many operating systems for querying the Domain Name System (DNS) to obtain domain name or IP address mappings or any other specific DNS record.
Wi-Fi Protected Access (WPA)
TACACS
firewalking
nslookup
45. A term trademarked by the Wi-Fi Alliance - used to define a standard for devices to use to connect to a wireless network.
Anonymizer
-PT
Wi-Fi
Open System Interconnection (OSI) Reference Model
46. Provides data encryption for IEEE 802.11 wireless networks so data can only be decrypted by the intended recipients.
sniffer
Wi-Fi Protected Access (WPA)
single loss expectancy (SLE)
User Datagram Protocol (UDP)
47. A malicious computer program with self-replication capabilities that attaches to another file and moves with the host from one computer to another.
Virus
human-based social engineering
reconnaissance
Antivirus (AV) software
48. A VPN tunneling protocol with encryption. PPTP connects two nodes in a VPN by using one TCP port for negotiation and authentication and one IP protocol for data transfer.
Point-to-Point Tunneling Protocol (PPTP)
promiscuous mode
Electronic serial number
Cold Site
49. A type of denial-of-service attack where a hacker sends thousands of SYN packets to the target with spoofed IP addresses.
suicide hacker
Virus Hoax
SYN attack
-sF
50. A host designed to collect data on suspicious activity.
Electronic Code Book (ECB)
Domain Name System (DNS) lookup
intrusion prevention system (IPS)
honeypot