SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The art and science of creating a covert message or image within another message - image - audio - or video file.
steganography
Defense in Depth
fully qualified domain name (FQDN)
MAC filtering
2. An approach to restricting system access to authorized users in which roles are created for various job functions. The permissions to perform certain operations are assigned to specific roles. Members of staff (or other system users) are assigned par
Digital Watermarking
port knocking
role-based access control
-oA
3. Computer software or hardware that can intercept and log traffic passing over a digital network.
security bulletins
Vulnerability Scanning
Media Access Control (MAC)
sniffer
4. A small Trojan program that listens on port 777.
Tini
polymorphic virus
security bulletins
null session
5. Controls internal to a system designed to resolve vulnerabilities and errors soon after they arise.
Simple Mail Transfer Protocol (SMTP)
Multipurpose Internet Mail Extensions (MIME)
Corrective Controls
session splicing
6. A record showing which user has accessed a given resource and what operations the user performed during a given period.
Audit Trail
shoulder surfing
signature scanning
Information Technology (IT) security architecture and framework
7. FTP Bounce Attack
Authentication - Authorization - and Accounting (AAA)
Access Creep
Open System Interconnection (OSI) Reference Model
-b
8. Management policy and procedures designed to maintain or restore business operations - including computer operations - possibly at an alternate location - in the event of emergencies - system failures - or disaster.
symmetric algorithm
Contingency Plan
CIA triangle
network operations center (NOC)
9. Used to find the domain name associated with an IP address; the opposite of a DNS lookup.
reverse lookup; reverse DNS lookup
NOP
secure channel
passive attack
10. The cyclical practice of identifying - classifying - remediating - and mitigating vulnerabilities.
Vulnerability Management
Fast Ethernet
End User Licensing Agreement (EULA)
Active Attack
11. The act of dialing all numbers within an organization to discover open modems.
War Dialing
inference attack
firewall
Annualized Loss Expectancy (ALE)
12. Content Addressable Memory table. Holds all the MAC-address-to-port mappings on a switch.
segment
social engineering
Zenmap
CAM table
13. Any item of value or worth to an organization - whether physical or virtual.
Asset
Overwhelm CAM table to convert switch to hub mode
Tiger Team
Application Layer
14. An organization's threshold for the seven areas of information security responsibility. This level is established based on the objectives for maintaining confidentiality - integrity - and availability of the organization's IT assets and infrastructur
Data Encryption Standard (DES)
Buffer Overflow
Daemon
Minimum acceptable level of risk
15. Layer 7 of the OSI reference model. The Application layer provides services to applications - which allow them access to the network. Protocols such as FTP and SMTP reside here.
Exposure Factor
Telnet
-oA
Application Layer
16. PI and PT Ping
Tini
identity theft
Directory Traversal
-PB
17. A file system used by the Mac OS.
Hierarchical File System (HFS)
-PI
spoofing
Request for Comments (RFC)
18. A brand name of analog scrambling and de-scrambling equipment for cable and satellite television - invented primarily to keep consumer Television receive-only (TVRO) satellite equipment from receiving TV programming except on a subscription basis.
Videocipher II Satellite Encryption System
Finding a directory listing and gaining access to a parent or root file for access to other files
Daemon
queue
19. Black box test
Network Basic Input/Output System (NetBIOS)
No previous knowledge of the network
Wired Equivalent Privacy (WEP)
fragmentation
20. Two or more LANs connected by a high-speed line across a large geographical area.
MAC filtering
Wide Area Network (WAN)
overt channel
Telnet
21. Devices - connected to one or more switches - grouped logically into a single broadcast domain. VLANs enable administrators to divide the devices connected to the switches into multiple VLANs without requiring separate physical switches.
Hacks without permission
Virtual Local Area Network (VLAN)
replay attack
protocol
22. NSA
National Security Agency
-sT
ECHO reply
FTP
23. A connectionless - layer 4 transport protocol. UDP is faster than TCP - but offers no reliability. A best effort is made to deliver the data - but no checks and verifications are performed to guarantee delivery. Therefore - UDP is termed a 'connectio
Event
Google hacking
Hierarchical File System (HFS)
User Datagram Protocol (UDP)
24. A set of related communications protocols operating together as a group to address communication at some or all of the seven layers of the OSI reference model.
protocol stack
Assessment
Access Point (AP)
spoofing
25. One or more locations from which control is exercised over a computer - television broadcast - or telecommunications network.
network operations center (NOC)
Internal access to the network
-sX
Mandatory access control (MAC)
26. An attack that is direct in nature - usually where the attacker injects something into - or otherwise alters - the network or system target.
flood
War Driving
DNS enumeration
Active Attack
27. Security measures - such as a locked door - perimeter fence - or security guard - to prevent or deter physical access to a facility - resource - or information stored on physical media.
Biometrics
White Box Testing
physical security
network tap
28. The public portion of an asymmetric key pair typically used to encrypt data or verify signatures. Public keys are shared and are used to encrypt messages.
Tini
public key
security by obscurity
inference attack
29. A string that represents the location of a web resource
-PM
red team
Uniform Resource Locator (URL)
-oX
30. An attack technique that tricks your DNS server into believing it has received authentic information when - in reality - it has been provided fraudulent data. DNS cache poisoning affects user traffic by sending it to erroneous or malicious end points
polymorphic virus
Domain Name System (DNS) cache poisoning
keylogger
Baseline
31. A method of external testing whereby several systems or resources are used together to effect an attack.
-b
Daisy Chaining
Directory Traversal
-oX
32. Monitoring of telephone or Internet conversations - typically by covert means.
Wiretapping
Fiber Distributed Data Interface (FDDI)
false negative
self encrypting
33. Actions - devices - procedures - techniques - or other measures intended to reduce the vulnerability of an information system.
Written Authorization
Archive
Internet Protocol (IP)
Countermeasures
34. A three-step process computers execute to negotiate a connection with one another. The three steps are SYN - SYN/ACK - ACK.
Zero Subnet
Packet Internet Groper (ping)
Three-Way (TCP) Handshake
role-based access control
35. Port 135
Password Authentication Protocol (PAP)
Zenmap
NetBSD
RPC-DCOM
36. A type of denial-of-service attack where a hacker sends thousands of SYN packets to the target with spoofed IP addresses.
Man-in-the-middle attack
SYN attack
network operations center (NOC)
script kiddie
37. Used for exchanging structured information - such as XML-based messages - in the implementation of web services
patch
Collision
Simple Object Access Protocol (SOAP)
honeypot
38. Set of tools (applications or code) that enables administrator-level accessto a computer or computer network and is designed to obscure the fact that the system has been compromised. Rootkits are dangerous malware entities that provide administrator
Methodology
rootkit
stream cipher
Ethernet
39. A function that is easy to compute in one direction - yet believed to be difficult to compute in the opposite direction (finding its inverse) without special information - called the 'trapdoor.' Widely used in cryptography.
-PS
Trapdoor Function
The automated process of proactively identifying vulnerabilities of computing systems present in a network
Dumpster Diving
40. The directory service created by Microsoft for use on itsnetworks. Provides a variety of network services using Lightweight Directory Access Protocol (LDAP) - Kerberos-based authentication - and single sign-on for user access to network-based resourc
Bluesnarfing
Active Directory (AD)
R
Network Basic Input/Output System (NetBIOS)
41. A hacking method for stealing the cookies used during a session build and replaying them for unauthorized connection purposes.
Back orifice
Wiretapping
Information Technology Security Evaluation Criteria (ITSEC)
sidejacking
42. An international encoding standard - working within multiple languages and scripts - that represents each letter - digit - or symbol with a unique numeric value that applies across different platforms.
Master boot record infector
Unicode
Black Hat
File Allocation Table (FAT)
43. Confidentiality - Integrity - and Availability are the three aspects of security and make up the triangle.
physical security
promiscuous mode
CIA triangle
Community String
44. A technology that establishes a tunnel to create a private - dedicated - leased-line network over the Internet. The data is encrypted so it's readable only by the sender and receiver. Companies commonly use VPNs to allow employees to connect securely
Virtual Private Network (VPN)
Collision
Archive
Information Technology (IT) security architecture and framework
45. A software or hardware defect that often results in system vulnerabilities.
Bug
pattern matching
Time To Live (TTL)
Overwhelm CAM table to convert switch to hub mode
46. Terminal Access Controller Access-Control System. A remote authentication protocol that is used to communicate with an authentication server commonly used in Unix networks.
TACACS
POP 3
-PM
Active Directory (AD)
47. SYN Ping
Availability
SID
sidejacking
-PS
48. Port 80/81/8080
Asymmetric
suicide hacker
HTTP
social engineering
49. The condition of a resource being ready for use and accessible by authorized users.
open source
Availability
Tiger Team
Auditing
50. A well-known and studied phenomenon of human nature - whereby a single trait influences the perception of other traits.
Covert Channel
Defense in Depth
halo effect
Common Internet File System/Server Message Block