SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The rate at which a biometric system will incorrectly reject an access attempt by an authorized user.
RxBoot
Due Care
false rejection rate (FRR)
Blowfish
2. An outdated symmetric cipher encryption algorithm - previously U.S. government-approved and used by business and civilian government agencies. DES is no longer considered secure due to the ease with which the entire keyspace can be attempted using mo
Data Encryption Standard (DES)
Last In First Out (LIFO)
Vulnerability Scanning
Macro virus
3. Devices - connected to one or more switches - grouped logically into a single broadcast domain. VLANs enable administrators to divide the devices connected to the switches into multiple VLANs without requiring separate physical switches.
Zero Subnet
Active Directory (AD)
Virtual Local Area Network (VLAN)
red team
4. A type of DNS transfer - where all records from an SOA are transmitted to the requestor. Zone transfers have two options: full (opcode AXFR) and incremental (IXFR).
Zone transfer
-oX
Buffer
SAM
5. Nmap grepable output
GET
stateful packet filtering
-oG
A R
6. Layer 2 of the OSI reference model. This layer provides reliable transit of data across a physical link. The Data Link layer is concerned with physical addressing - network topology - access to the network medium - error detection - sequential delive
gray hat
Bug
Data Link layer
Archive
7. A software or hardware defect that often results in system vulnerabilities.
Simple Mail Transfer Protocol (SMTP)
Cookie
Bug
local area network (LAN)
8. Port 135
A S
-sX
RPC-DCOM
intranet
9. Drawing symbols in public places to alert others to an open Wi-Fi network. War chalking can include the SSIDs - administrative passwords to APs - and other information.
War Chalking
User Datagram Protocol (UDP)
Exposure Factor
enumeration
10. A class of algorithms for cryptography that use the same cryptographic key for both decryption and encryption.
inference attack
human-based social engineering
symmetric algorithm
Availability
11. In penetration testing - enumeration is the act of querying a device or network segment thoroughly and systematically for information.
-PM
enumeration
GET
Domain Name
12. An Application layer protocol - using TCP - for transporting files across an Internet connection. FTP transmits in clear text.
Boot Sector Virus
File Transfer Protocol (FTP)
MD5
risk
13. Weakness in an information system - system security procedures - internal controls - or implementation that could be exploited or triggered by a threat source.
Vulnerability Scanning
Bug
Vulnerability
quantitative risk assessment
14. An attack where the hacker positions himself between the client and the server - to intercept (and sometimes alter) data traveling between the two.
Vulnerability Management
Man-in-the-middle attack
Destination Unreachable
qualitative analysis
15. A defined measure of service within a network system
quality of service (QoS)
Threat
RxBoot
risk acceptance
16. A social-engineering attack using computer resources - such as e-mail or IRC.
Internal access to the network
rootkit
Computer-Based Attack
Audit Data
17. The process of embedding information into a digital signal in a way that makes it difficult to remove.
Digital Watermarking
stream cipher
Hypertext Transfer Protocol Secure (HTTPS)
personal identification number (PIN)
18. A stand-alone computer - kept off the network - that is used for scanning potentially malicious media or software.
No previous knowledge of the network
sheepdip
Internal access to the network
Access Point (AP)
19. Port 137/138/139
Data Link layer
John the Ripper - LOphtcrack - Ophtcrack - Cain and Abel
SMB
intrusion prevention system (IPS)
20. A wireless networking mode where all clients connect to the wireless network through a central access point.
hash
infrastructure mode
Wi-Fi Protected Access (WPA)
route
21. Physical socket provided on routers and switches for cable connections between a computer and the router/switch. This connection enables the computer to configure - query - and troubleshoot the router/switch by use of a terminal emulator and a comman
Countermeasures
Console Port
quality of service (QoS)
File Allocation Table (FAT)
22. A connectionless - layer 4 transport protocol. UDP is faster than TCP - but offers no reliability. A best effort is made to deliver the data - but no checks and verifications are performed to guarantee delivery. Therefore - UDP is termed a 'connectio
Collision Domain
User Datagram Protocol (UDP)
Address Resolution Protocol (ARP)
Warm Site
23. Actions - devices - procedures - techniques - or other measures intended to reduce the vulnerability of an information system.
Countermeasures
serialize scans & 0.4 sec wait
Replacing numbers in a url to access other files
Trapdoor Function
24. A device set up to send a response on behalf of an end node to the requesting host. Proxies are generally used to obfuscate the host from the Internet.
proxy server
Network Address Translation (NAT)
Vulnerability
risk avoidance
25. A virus designed to infect the master boot record.
Level III assessment
Master boot record infector
Information Technology (IT) infrastructure
security bulletins
26. A collection of historical records or the place where they are kept. In computing - an archive generally refers to backup copies of logs and/or data.
SYN attack
Exposure Factor
Request for Comments (RFC)
Archive
27. A utility that sends an ICMP Echo message to determine if a specific IP address is accessible; if the message receives a reply - the address is reachable.
Packet Internet Groper (ping)
Computer Emergency Response Team (CERT)
Wi-Fi Protected Access (WPA)
Simple Network Management Protocol (SNMP)
28. Using conversation or some other interaction between people to gather useful information.
Hierarchical File System (HFS)
human-based social engineering
forwarding
NT LAN Manager (NTLM)
29. ICMP Netmask
Telnet
-PM
Trapdoor Function
honeypot
30. An electronic version of junk mail. Unsolicited commercial e-mail sent to numerous recipients.
Address Resolution Protocol (ARP) table
SID
single loss expectancy (SLE)
spam
31. A social-engineering attack that manipulates the victim into calling the attacker for help.
reverse social engineering
-p <port ranges>
patch
Tunneling
32. The last portion of the SID that identifies the user to the system in Windows. A RID of 500 identifies the administrator account.
Last In First Out (LIFO)
INFOSEC Assessment Methodology (IAM)
Application Layer
RID Resource identifier
33. A method of evaluating the security of a computer system or network by simulating an attack from a malicious source.
penetration testing
symmetric algorithm
Electronic Code Book (ECB)
Directory Traversal
34. An authentication method on point-to-point links - using a three-way handshake and a mutually agreed-upon key.
Eavesdropping
Sign in Seal
Challenge Handshake Authentication Protocol (CHAP)
Destination Unreachable
35. The software product or system that is the subject of an evaluation.
network interface card (NIC)
Target Of Engagement (TOE)
Access Control List (ACL)
Real application encompassing Trojan
36. Also known as a digital certificate - this is an electronic file used to verify a user's identity - providing non-repudiation throughout the system It is also a set of data that uniquely identifies an entity. Certificates contain the entity's public
NetBus
Audit Trail
Active Directory (AD)
Certificate
37. The process of transforming ciphertext into plaintext through the use of a cryptographic algorithm.
Decryption
-sV
Hypertext Transfer Protocol Secure (HTTPS)
Boot Sector Virus
38. Ports 20/21
Algorithm
SYN flood attack
FTP
-sT
39. The act of using numerous electronic serial numbers on a cell phone until a valid number is located.
Back orifice
Tumbling
open source
Eavesdropping
40. Malicious code that uses a polymorphic engine to mutate while keeping the original algorithm intact; the code changes itself each time it runs - but the function of the code will not change.
NOP
polymorphic virus
limitation of liability and remedies
session hijacking
41. Hashing algorithm that results in a 128-bit output.
RPC-DCOM
rootkit
Level III assessment
MD5
42. ACK Scan
War Chalking
Network Basic Input/Output System (NetBIOS)
-sA
A
43. The steps taken to gather evidence and information on the targets you wish to attack.
reconnaissance
Buffer Overflow
Daemon
-sS
44. The level of importance assigned to an IT asset
Corrective Controls
Information Technology (IT) asset criticality
risk acceptance
HTTP
45. A social-engineering effort in which the attacker pretends to be an employee - a valid user - or even an executive to elicit information or access.
HTTP
Acknowledgment (ACK)
Vulnerability Assessment
impersonation
46. A background process found in Unix - Linux - Solaris - and other Unix-based operating systems.
Virus
sheepdip
CIA triangle
Daemon
47. A Canonical Name record within DNS - used to provide an alias for a domain name.
Challenge Handshake Authentication Protocol (CHAP)
Post Office Protocol 3 (POP3)
CNAME record
security bulletins
48. Used for exchanging structured information - such as XML-based messages - in the implementation of web services
Hypertext Transfer Protocol Secure (HTTPS)
Simple Object Access Protocol (SOAP)
Authorization
Collision Domain
49. An organization's threshold for the seven areas of information security responsibility. This level is established based on the objectives for maintaining confidentiality - integrity - and availability of the organization's IT assets and infrastructur
CAM table
Tini
Due Diligence
Minimum acceptable level of risk
50. Another term for firewalking
Cloning
Auditing
SYN attack
port knocking