SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The subjective - potential percentage of loss to a specific asset if a specific threat is realized. The exposure factor (EF) is a subjective value the person assessing risk must define.
Vulnerability Scanning
rule-based access control
Exposure Factor
Overwhelm CAM table to convert switch to hub mode
2. An environmentally conditioned workspace partially equipped with IT and telecommunications equipment to support relocated IT operations in the event of a significant disruption.
Black Hat
Wiretapping
Warm Site
private key
3. A TCP flag notifying an originating station that the preceding packet (or packets) has been received.
NOP
port scanning
Antivirus (AV) software
Acknowledgment (ACK)
4. A section or subset of the network. Often a router or other routing device provides the end point of the segment.
security bulletins
route
segment
Internet Control Message Protocol (ICMP)
5. Ports 20/21
OpenBSD
FTP
intranet
Simple Network Management Protocol (SNMP)
6. A backup facility with the electrical and physical components of a computer facility - but with no computer equipment in place. The site is ready to receive the necessary replacement computer equipment in the event the user has to move from his main
Authentication
Application Layer
footprinting
Cold Site
7. The steps taken to gather evidence and information on the targets you wish to attack.
Backdoor
-PT
reconnaissance
Multipurpose Internet Mail Extensions (MIME)
8. Layer 2 of the OSI reference model. This layer provides reliable transit of data across a physical link. The Data Link layer is concerned with physical addressing - network topology - access to the network medium - error detection - sequential delive
self encrypting
Data Link layer
-sV
Possession of access devices
9. A term representing the responsibility managers and their organizations have to provide information security to ensure the type of control - the cost of control - and the deployment of control are appropriate for the system being managed.
Accountability
identity theft
Due Care
Crossover Error Rate (CER)
10. Text or data in its encrypted form; the result of plaintext being input into a cryptographic algorithm.
EDGAR database
steganography
Ciphertext
Black Box Testing
11. Also known as a public key certificate - this is an electronic file that is used to verify a user's identity - providing non-repudiation throughout the sys-tem. Certificates contain the entity's public key - serial number - version - subject - algori
White Box Testing
Administratively Prohibited
Digital Certificate
Redundant Array of Independent Disks (RAID)
12. A stand-alone computer - kept off the network - that is used for scanning potentially malicious media or software.
Brute-Force Password Attack
sheepdip
personal identification number (PIN)
R
13. Authentication confirms the identity of the user or device. Authorization determines the privileges (rights) of the user or device. Accounting records the access attempts - both successful and unsuccessful.
Network Address Translation (NAT)
NetBus
Authentication - Authorization - and Accounting (AAA)
Rijndael
14. TCP connect() scan
network operations center (NOC)
-sT
-oG
Tunneling
15. Method used by antivirus software to detect new - unknown viruses that have not yet been identified; based on a piece-by-piece examination of a program - looking for a sequence or sequences of instructions that differentiate the virus from 'normal' p
heuristic scanning
Malicious code
nslookup
File Transfer Protocol (FTP)
16. A value assigned to uniquely identify a single wide area network (WAN) in wireless LANs. SSIDs are broadcast by default - and are sent in the header of every packet. SSIDs provide no encryption or security.
Service Set Identifier (SSID)
secure channel
Audit Trail
packet
17. An evaluation conducted to determine the potential for damage to or loss of an IT asset.
U P F
risk assessment
quantitative risk assessment
Presentation layer
18. An Application layer protocol for sending electronic mail between servers.
Simple Mail Transfer Protocol (SMTP)
remote procedure call (RPC)
Cold Site
Buffer
19. A remote control program in which the client runs on a local computer and connects to a remote server on a network. Commands entered locally are executed on the remote system.
Telnet
Demilitarized Zone (DMZ)
network tap
Packet Internet Groper (ping)
20. An Internet routing protocol used to exchange routing information within an autonomous system.
Interior Gateway Protocol (IGP)
gray box testing
replay attack
red team
21. Directory Transversal
spam
A
Kerberos
Finding a directory listing and gaining access to a parent or root file for access to other files
22. A systematic process for the assessment of security vulnerabilities.
Address Resolution Protocol (ARP) table
Client
INFOSEC Assessment Methodology (IAM)
-PP
23. Port 137/138/139
SOA record
SMB
segment
-sW
24. White hat
Corrective Controls
Hacks with permission
-oN
Redundant Array of Independent Disks (RAID)
25. A standard for encrypting and authenticating MIME data; used primarily for Internet e-mail.
Bluetooth
Secure Multipurpose Mail Extension (S/MIME)
red team
Algorithm
26. A hybrid of the HTTP and SSL/TLS protocols that provides encrypted communication and secure identification of a web server.
Zero Subnet
Hypertext Transfer Protocol Secure (HTTPS)
stateful packet filtering
net use \[target ip]IPC$ '' /user:''
27. Devices - connected to one or more switches - grouped logically into a single broadcast domain. VLANs enable administrators to divide the devices connected to the switches into multiple VLANs without requiring separate physical switches.
Virtual Local Area Network (VLAN)
limitation of liability and remedies
NetBus
Web Spider
28. The process of recording activity on a system for monitoring and later review.
risk avoidance
Virtual Private Network (VPN)
Auditing
RxBoot
29. A firewall evasion technique whereby packets are wrapped in HTTP - as a covert channel to the target.
HTTP tunneling
Auditing
human-based social engineering
stream cipher
30. Establish Null Session
serial scan & 300 sec wait
public key infrastructure (PKI)
net use \[target ip]IPC$ '' /user:''
Information Technology (IT) asset valuation
31. A type of DNS transfer - where all records from an SOA are transmitted to the requestor. Zone transfers have two options: full (opcode AXFR) and incremental (IXFR).
qualitative analysis
Zone transfer
Denial of Service (DoS)
Self Replicating
32. Recording the time - normally in a log file - when an event happens or when information is created or modified.
Dumpster Diving
-sA
Written Authorization
Timestamping
33. An international encoding standard - working within multiple languages and scripts - that represents each letter - digit - or symbol with a unique numeric value that applies across different platforms.
Console Port
protocol stack
Directory Traversal
Unicode
34. An attack where the hacker manipulates parameters within the URL string in hopes of modifying data.
parameter tampering
Written Authorization
Challenge Handshake Authentication Protocol (CHAP)
Network Address Translation (NAT)
35. A U.S. Department of Defense (DoD) standard that sets basic requirements for assessing the effectiveness of computer security controls built into a computer system.
Three-Way (TCP) Handshake
Cache
Trusted Computer System Evaluation Criteria (TCSEC)
Service Set Identifier (SSID)
36. ICMP Type/Code 3-13
Unicode
Access Point (AP)
Administratively Prohibited
Trapdoor Function
37. Host-based IDS. An IDS that resides on the host - protecting against file and folder manipulation and other host-based attacks and actions.
Secure Multipurpose Mail Extension (S/MIME)
HIDS
hybrid attack
-sW
38. Metamorphic Virus
Self Replicating
Authentication - Authorization - and Accounting (AAA)
site survey
integrity
39. A class of algorithms for cryptography that use the same cryptographic key for both decryption and encryption.
private key
symmetric algorithm
segment
CNAME record
40. As an identification device becomes more sensitive or accurate - its FAR decreases while its FRR increases. The CER is the point at which these two rates are equal - or cross over.
ring topology
Traceroute
nslookup
false rejection rate (FRR)
41. The monetary loss that can be expected for an asset due to risk over a one-year period. ALE is the product of the annual rate of occurrence (ARO) and the single loss expectancy (SLE). It is mathematically expressed as ALE = ARO
Annualized Loss Expectancy (ALE)
ping sweep
Authentication Header (AH)
firewall
42. A self-replicating malicious program that attempts installation beneath antivirus software by directly intercepting the interrupt handlers of the operating system to evade detection.
Tunneling Virus
parallel scan
Certificate
Boot Sector Virus
43. The set of all hardware - firmware - and/or software components critical to IT security. Bugs or vulnerabilities occurring inside the TCB might jeopardize the security properties of the entire system.
Trusted Computer Base (TCB)
Defines legal email marketing
source routing
suicide hacker
44. A measurable - physical characteristic used to recognize the identity - or verify the claimed identity - of an applicant. Facial images - fingerprints - and handwriting samples are all examples of biometrics.
Point-to-Point Protocol (PPP)
remote procedure call (RPC)
Biometrics
Videocipher II Satellite Encryption System
45. The ability to trace actions performed on a system to a specific user or system entity.
Trojan Horse
Accountability
Mantrap
Buffer Overflow
46. The process of embedding information into a digital signal in a way that makes it difficult to remove.
Collision
SNMP
initial sequence number (ISN)
Digital Watermarking
47. A group of people - gathered together by a business entity - working to address a specific problem or goal.
Hierarchical File System (HFS)
Tiger Team
Videocipher II Satellite Encryption System
ping sweep
48. A device or service designed to obfuscate traffic between a client and the Internet. Generally used to make activity on the Internet as untraceable as possible.
phishing
Anonymizer
security incident response team (SIRT)
Packet Internet Groper (ping)
49. A protocol that allows a client computer to request services from a server and the server to return the results.
International Organization for Standardization (ISO)
remote procedure call (RPC)
-sI
-PM
50. A text file stored within a browser by a web server that maintains information about the connection. Cookies are used to store information to maintain a unique but consistent surfing experience - but can also contain authentication parameters. Cookie
open source
Cloning
File Transfer Protocol (FTP)
Cookie