SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A networking configuration where all nodes are connected in a circle with no terminated ends on the cable.
risk avoidance
Computer-Based Attack
ISO 17799
ring topology
2. PI and PT Ping
-PB
Time To Live (TTL)
Vulnerability Management
Wi-Fi
3. Provides router-to-router or host-to-network connections over asynchronous and synchronous circuits.
Local Administrator
Wireless Local Area Network (WLAN)
Point-to-Point Protocol (PPP)
Archive
4. Hex 14
gray box testing
A R
-sW
Virtual Local Area Network (VLAN)
5. The rate at which a biometric system will incorrectly reject an access attempt by an authorized user.
routed protocol
Three-Way (TCP) Handshake
false rejection rate (FRR)
gray box testing
6. The result of using a private key to encrypt a hash value for identification purposes within a PKI system. The signature can be decoded by the originator's public key - verifying his identity and providing non-repudiation. A valid digital signature g
Institute of Electrical and Electronics Engineers (IEEE)
Digital Signature
Cookie
Information Technology (IT) asset criticality
7. An electronic version of junk mail. Unsolicited commercial e-mail sent to numerous recipients.
suicide hacker
-oN
polymorphic virus
spam
8. ACK Scan
-sA
Point-to-Point Tunneling Protocol (PPTP)
ring topology
The automated process of proactively identifying vulnerabilities of computing systems present in a network
9. A document describing information security guidelines - policies - procedures - and standards.
404EE
Audit Trail
Zone transfer
Information Technology (IT) security architecture and framework
10. An authentication method on point-to-point links - using a three-way handshake and a mutually agreed-upon key.
Anonymizer
Challenge Handshake Authentication Protocol (CHAP)
site survey
Level III assessment
11. A point-to-point connection between two endpoints created to exchangedata. Typically a tunnel is either an encrypted connection - or a connection using a protocol in a method for which it was not designed. An encrypted connection forms a point-to-poi
Wi-Fi
keylogger
key exchange protocol
Tunnel
12. The subjective - potential percentage of loss to a specific asset if a specific threat is realized. The exposure factor (EF) is a subjective value the person assessing risk must define.
Destination Unreachable
Hacks without permission
Exposure Factor
Kerberos
13. A social-engineering attack using computer resources - such as e-mail or IRC.
War Dialing
remote access
Data Link layer
Computer-Based Attack
14. A query and response protocol widely used for querying databases that store the registered users or assignees of an Internet resource - such as a domain name - an IP address - or an autonomous system.
Whois
Reconnaissance - Scanning - Gaining Access - Maintaining Access - Covering Tracks
Computer-Based Attack
Acceptable Use Policy (AUP)
15. The Security Accounts Manager file in Windows stores all the password hashes for the system.
Biometrics
SAM
spoofing
Internet Protocol Security (IPSec) architecture
16. A method of falsely identifying the source of data packets; often used by hackers to make it difficult to trace where an attack originated.
Packet Internet Groper (ping)
spoofing
-PM
NT LAN Manager (NTLM)
17. The public portion of an asymmetric key pair typically used to encrypt data or verify signatures. Public keys are shared and are used to encrypt messages.
public key
Adware
Countermeasures
firewalking
18. An organization composed of engineers - scientists - and students who issue standards related to electrical - electronic - and computer engineering.
-oA
Transmission Control Protocol (TCP)
Vulnerability Assessment
Institute of Electrical and Electronics Engineers (IEEE)
19. A business - government agency - or educational institution that provides access to the Internet.
Internet service provider (ISP)
Kerberos
proxy server
U P F
20. Hex 04
routed protocol
iris scanner
Telnet
R
21. A symmetric - block-cipher data-encryption standard that uses a variablelength key that can range from 32 bits to 448 bits.
FTP
-sF
Blowfish
Common Internet File System/Server Message Block
22. Baseband LAN specification developed by Xerox Corporation - Intel - and Digital Equipment Corporation. One of the least expensive - most widely deployed networking standards; uses the CSMA/CD method of media access control.
Acknowledgment (ACK)
RPC-DCOM
infrastructure mode
Ethernet
23. NSA
National Security Agency
public key
A R
suicide hacker
24. Ping Scan
-sP
Reconnaissance - Scanning - Gaining Access - Maintaining Access - Covering Tracks
queue
single loss expectancy (SLE)
25. A program designed to browse websites in an automated - methodical manner. Sometimes these programs are used to harvest information from websites - such as e-mail addresses.
gray hat
Adware
personal identification number (PIN)
Web Spider
26. Port 135
Cold Site
RPC-DCOM
role-based access control
Lightweight Directory Access Protocol (LDAP)
27. Transmitting one protocol encapsulated inside another protocol.
network access server
Access Creep
Data Link layer
Tunneling
28. A unique numerical string - created by a hashing algorithm on a given piece of data - used to verify data integrity. Generally hashes are used to verify the integrity of files after download (comparison to the hash value on the site before download)
hash
Fiber Distributed Data Interface (FDDI)
Crossover Error Rate (CER)
Auditing
29. A method of external testing whereby several systems or resources are used together to effect an attack.
Daisy Chaining
penetration testing
Finger
Authorization
30. A step-by-step method of solving a problem. In computing security - an algorithm is a set of mathematical rules (logic) for the process of encryption and decryption
Three-Way (TCP) Handshake
Algorithm
MD5
Hierarchical File System (HFS)
31. In computer security - this is an algorithm that uses separate keys for encryption and decryption.
asynchronous transmission
Asymmetric Algorithm
network tap
encryption
32. The potential for damage to or loss of an IT asset
RxBoot
rule-based access control
risk
Possession of access devices
33. Freely and readily available information on an organization that can be gathered by a business entity about its competitor's customers - products - and marketing - and can be used by an attacker to build useful information for further attacks.
public key infrastructure (PKI)
Competitive Intelligence
--randomize_hosts -O OS fingerprinting
CAM table
34. Also known as a digital certificate - this is an electronic file used to verify a user's identity - providing non-repudiation throughout the system It is also a set of data that uniquely identifies an entity. Certificates contain the entity's public
network tap
Certificate
-P0
Block Cipher
35. Independent review and examination of records and activities to assess the adequacy of system controls - to ensure compliance with established policies and operational procedures - and to recommend necessary changes.
NOP
Block Cipher
Corrective Controls
audit
36. An international organization composed of national standards bodies from over 75 countries. Developed the OSI reference model.
fully qualified domain name (FQDN)
false rejection rate (FRR)
International Organization for Standardization (ISO)
Audit Data
37. TCP SYN Scan
-sS
A S
Cache
social engineering
38. Shifting responsibility from one party to another
payload
risk transference
-sS
802.11
39. Idlescan
initial sequence number (ISN)
piggybacking
-sI
Defense in Depth
40. A remote control program in which the client runs on a local computer and connects to a remote server on a network. Commands entered locally are executed on the remote system.
Telnet
Buffer
Droppers
Detective Controls
41. A means of exchanging information from one entity to another using a process that does not provide an attacker the opportunity to reorder - delete - insert - or read information.
secure channel
Presentation layer
Information Technology (IT) infrastructure
honeypot
42. An adapter that provides the physical connection to send and receive data between the computer and the network media.
Telnet
network interface card (NIC)
Distributed DoS (DDoS)
Ethernet
43. A string that represents the location of a web resource
Buffer Overflow
Droppers
session hijacking
Uniform Resource Locator (URL)
44. Calculations of two components of risk: R - the magnitude of the potential loss (L) - and the probability - p - that the loss will occur.
Internet Assigned Number Authority (IANA)
POP 3
Certificate Authority (CA)
quantitative risk assessment
45. Originally an extension of PPP - this is a protocol for authentication used within wireless networks. Works with multiple authentication measures.
separation of duties
False Acceptance Rate (FAR)
hash
Extensible Authentication Protocol (EAP)
46. Port 22
Administratively Prohibited
SSH
port redirection
symmetric algorithm
47. An attack with the goal of preventing authorized users from accessing services and preventing the normal operation of computers and networks.
Certificate
Denial of Service (DoS)
Self Replicating
--randomize_hosts -O OS fingerprinting
48. An Internet Protocol Security (IPSec) header used to verify that the contents of a packet have not been modified while the packet was in transit.
Access Control List (ACL)
802.11 i
Authentication Header (AH)
Information Technology Security Evaluation Criteria (ITSEC)
49. ICMP Timestamp
Buffer
SSH
-PP
null session
50. An Application layer protocol - using TCP - for transporting files across an Internet connection. FTP transmits in clear text.
Application Layer
File Transfer Protocol (FTP)
flood
Telnet
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests