SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Malicious code that uses a polymorphic engine to mutate while keeping the original algorithm intact; the code changes itself each time it runs - but the function of the code will not change.
signature scanning
Vulnerability Assessment
polymorphic virus
Active Attack
2. A set of exclusive rights granted by the law of a jurisdiction to the author or creator of an original work - including the right to copy - distribute - and adapt the work.
End User Licensing Agreement (EULA)
Telnet
Post Office Protocol 3 (POP3)
Copyright
3. A software or hardware application or device that captures user keystrokes.
Uniform Resource Locator (URL)
keylogger
reverse social engineering
intranet
4. A free and popular version of the Unix operating system.
port knocking
FreeBSD
personal identification number (PIN)
Acknowledgment (ACK)
5. As an identification device becomes more sensitive or accurate - its FAR decreases while its FRR increases. The CER is the point at which these two rates are equal - or cross over.
-PT
false rejection rate (FRR)
Dumpster Diving
security defect
6. Confidentiality - Integrity - and Availability are the three aspects of security and make up the triangle.
Replacing numbers in a url to access other files
passive attack
CIA triangle
Self Replicating
7. A device providing temporary - on-demand - point-to-point network access to users.
Bug
Cracker
network access server
Bluesnarfing
8. A U.S. Department of Defense (DoD) standard that sets basic requirements for assessing the effectiveness of computer security controls built into a computer system.
Trojan Horse
Active Attack
Trusted Computer System Evaluation Criteria (TCSEC)
U P F
9. An inspection of a place where a company or individual proposes to work - to gather the necessary information for a design or risk assessment.
Filter
Domain Name System (DNS) cache poisoning
Wireless Local Area Network (WLAN)
site survey
10. An Application layer protocol - using TCP - for transporting files across an Internet connection. FTP transmits in clear text.
Internet service provider (ISP)
File Transfer Protocol (FTP)
routed protocol
International Organization for Standardization (ISO)
11. Port 88
Trapdoor Function
Vulnerability Scanning
honeypot
Kerberos
12. A nonnumerical - subjective risk evaluation. Used with qualitative assessment (an evaluation of risk that results in ratings of none - low - medium - and high for the probability.)
qualitative analysis
Vulnerability Management
sheepdip
Vulnerability Scanning
13. The process of systematically testing each port on a firewall to map rules and determine accessible ports.
parallel scan & 300 sec timeout & 1.25 sec/probe
Droppers
firewalking
replay attack
14. A term trademarked by the Wi-Fi Alliance - used to define a standard for devices to use to connect to a wireless network.
security bulletins
Archive
port scanning
Wi-Fi
15. The process of using easily accessible DNS records to map a target network's internal hosts.
DNS enumeration
Hierarchical File System (HFS)
serialize scans & 15 sec wait
Unicode
16. Actions - devices - procedures - techniques - or other measures intended to reduce the vulnerability of an information system.
Countermeasures
Point-to-Point Tunneling Protocol (PPTP)
Information Technology (IT) asset criticality
protocol
17. Port 389
Acceptable Use Policy (AUP)
Domain Name System (DNS)
Access Control List (ACL)
LDAP
18. A hybrid of the HTTP and SSL/TLS protocols that provides encrypted communication and secure identification of a web server.
network interface card (NIC)
packet filtering
Bug
Hypertext Transfer Protocol Secure (HTTPS)
19. Port 161/162
Transport Layer Security (TLS)
SNMP
Routing Information Protocol (RIP)
HIDS
20. A system used by the Securities and Exchange Commission (SEC) for companies and businesses to transmit required filings and information. The EDGAR database performs automated collection - validation - indexing - acceptance - and forwarding of submiss
Asymmetric
Warm Site
EDGAR database
Transport Layer Security (TLS)
21. A remote control program in which the client runs on a local computer and connects to a remote server on a network. Commands entered locally are executed on the remote system.
Telnet
Smurf attack
port knocking
serialize scans & 0.4 sec wait
22. A Windows-based GUI version of nmap.
security kernel
ping sweep
Assessment
Zenmap
23. Port 80/81/8080
HTTP
-sT
spam
CNAME record
24. A domain composed of all the systems sharing any given physical transport media. Systems within a collision domain may collide with each other during the transmission of data. Collisions can be managed by CSMA/CD (collision detection) or CSMA/CA (col
Brute-Force Password Attack
Level III assessment
Collision Domain
Trusted Computer System Evaluation Criteria (TCSEC)
25. A backlog of packets stored in buffers and waiting to be forwarded over an interface.
-sR
queue
Daemon
Virtual Local Area Network (VLAN)
26. A protocol that allows a client computer to request services from a server and the server to return the results.
remote procedure call (RPC)
infrastructure mode
Discretionary Access Control (DAC)
Traceroute
27. An attack where the hacker positions himself between the client and the server - to intercept (and sometimes alter) data traveling between the two.
Cryptography
Man-in-the-middle attack
Fraud and related activity in connection with computers
router
28. ICMP Type/Code 8
human-based social engineering
Echo request
ping sweep
Trusted Computer Base (TCB)
29. A group of people - gathered together by a business entity - working to address a specific problem or goal.
Wi-Fi Protected Access (WPA)
honeypot
Tiger Team
S
30. A type of DNS transfer - where all records from an SOA are transmitted to the requestor. Zone transfers have two options: full (opcode AXFR) and incremental (IXFR).
-P0
Multipurpose Internet Mail Extensions (MIME)
Zone transfer
Discretionary Access Control (DAC)
31. A number assigned during TCP startup sessions that tracks how much information has been moved. This number is used by hackers when hijacking sessions.
initial sequence number (ISN)
-sO
Authentication
Audit Data
32. The means by which a recipient of a message can ensure the identity of the sender and that neither party can deny having sent or received the message. The most common method is through digital certificates.
Audit Data
-PM
non-repudiation
Biometrics
33. A term representing the responsibility managers and their organizations have to provide information security to ensure the type of control - the cost of control - and the deployment of control are appropriate for the system being managed.
War Driving
honeypot
Due Care
Due Diligence
34. A document describing information security guidelines - policies - procedures - and standards.
Wrapper
Information Technology (IT) security architecture and framework
qualitative analysis
false rejection rate (FRR)
35. The directory service created by Microsoft for use on itsnetworks. Provides a variety of network services using Lightweight Directory Access Protocol (LDAP) - Kerberos-based authentication - and single sign-on for user access to network-based resourc
suicide hacker
Administratively Prohibited
SYN attack
Active Directory (AD)
36. UDP Scan
-sU
No previous knowledge of the network
A procedure for identifying active hosts on a network.
honeypot
37. Port 31337
Bastion host
CNAME record
Back orifice
Transmission Control Protocol (TCP)
38. Literally - 'not balanced or the same.' In computing - asymmetric refers to a difference in networking speeds upstream to downstream. In cryptography - it's the use of more than one key for encryption/authentication purposes.
U P F
Asymmetric
symmetric encryption
Demilitarized Zone (DMZ)
39. A device or service designed to obfuscate traffic between a client and the Internet. Generally used to make activity on the Internet as untraceable as possible.
Brute-Force Password Attack
Anonymizer
self encrypting
Web Spider
40. A NAT method in which multiple internal hosts - using private IP addressing - can be mapped through a single public IP address using the session IDs and port numbers. An internal global IP address can support in excess of 65 -000 concurrent TCP and U
Port Address Translation (PAT)
Black Hat
A
phishing
41. An e-mail protection method using a secret message or image that can be referenced on any official communication with the site; if an e-mail is received without the image or message - the recipient knows it is not legitimate.
Client
Sign in Seal
Droppers
Virus Hoax
42. In computer security - this is an algorithm that uses separate keys for encryption and decryption.
Third Party
Asymmetric Algorithm
false negative
asynchronous transmission
43. 18 U.S.C. 1029
risk avoidance
physical security
Possession of access devices
Denial of Service (DoS)
44. RPC Scan
red team
Tini
Asynchronous
-sR
45. The contents of a packet. A system attack requires the attacker to deliver a malicious payload that is acted upon and executed by the system.
separation of duties
honeynet
payload
John the Ripper - LOphtcrack - Ophtcrack - Cain and Abel
46. Software that has advertisements embedded within. Generally displays ads in the form of pop-ups.
Asynchronous
phishing
Corrective Controls
Adware
47. Directing a protocol from one port to another.
Due Diligence
port redirection
SAM
NT LAN Manager (NTLM)
48. Provides data encryption for IEEE 802.11 wireless networks so data can only be decrypted by the intended recipients.
Internet Assigned Number Authority (IANA)
Active Directory (AD)
Wi-Fi Protected Access (WPA)
Port Address Translation (PAT)
49. A social-engineering attack using computer resources - such as e-mail or IRC.
Time To Live (TTL)
Computer-Based Attack
proxy server
Threat
50. Controlling access to a network by analyzing the headers of incoming and outgoing packets - and letting them pass or discarding them based on rule sets created by a network administrator. A packet filter allows or denies packets based on destination
packet filtering
Cold Site
DNS
Archive
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests