SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Wrapper or Binder
Real application encompassing Trojan
Hacks without permission
Internet service provider (ISP)
LDAP
2. A formal set of rules describing data transmission - especially across a network. A protocol determines the type of error checking - the data compression method - how the sending device will indicate completion - how the receiving device will indicat
A series of messages sent by someone attempting to break into a computer to learn about the computer's network services.
keylogger
Master boot record infector
protocol
3. ICMP Ping
-PI
Computer Emergency Response Team (CERT)
protocol
Dumpster Diving
4. Cracking Tools
ECHO reply
International Organization for Standardization (ISO)
remote procedure call (RPC)
John the Ripper - LOphtcrack - Ophtcrack - Cain and Abel
5. 1. The path a packet travels to reach the intended destination. Each individual device along the path traveled is called a hop. 2. Information contained on a device containing instructions for reaching other nodes on the network. This information can
OpenBSD
DNS
route
-sU
6. Incremental Substitution
quantitative risk assessment
Replacing numbers in a url to access other files
Presentation layer
Brute-Force Password Attack
7. Port 88
-sX
Kerberos
Application Layer
Active Directory (AD)
8. A type 0 ICMP message used to reply to ECHO requests. Used with ping to verify network layer connectivity between hosts.
Level II assessment
spoofing
remote access
ECHO reply
9. A method of password cracking whereby all possible options are systematically enumerated until a match is found. These attacks try every password (or authentication option) - one after another - until successful. Bruteforce attacks take a long time t
Brute-Force Password Attack
Authorization
router
piggybacking
10. In computer security - this is an algorithm that uses separate keys for encryption and decryption.
Auditing
Asymmetric Algorithm
hacktivism
Data Link layer
11. A wireless LAN security standard developed by IEEE. Requires Temporal Key Integrity Protocol (TKIP) and Advanced Encryption Standard (AES).
hash
802.11 i
Information Technology Security Evaluation Criteria (ITSEC)
Hypertext Transfer Protocol Secure (HTTPS)
12. Created by the U.S. Federal Communications Commission to uniquely identify mobile devices; often represented as an 11-digit decimal number or eight-digit hexadecimal number.
Electronic serial number
Digital Certificate
Daemon
Asset
13. A trusted entity that issues and revokes public key certificates. In a network - a CA is a trusted entity that issues - manages - and revokes security credentials and public keys for message encryption and/or authentication. Within a public key infra
Certificate Authority (CA)
security bulletins
symmetric encryption
Archive
14. A method of external testing whereby several systems or resources are used together to effect an attack.
Daisy Chaining
logic bomb
gray hat
network access server
15. A well-known and studied phenomenon of human nature - whereby a single trait influences the perception of other traits.
Address Resolution Protocol (ARP)
POST
halo effect
Kerberos
16. Vulnerability Scanning
The automated process of proactively identifying vulnerabilities of computing systems present in a network
Echo Reply
Virus
Last In First Out (LIFO)
17. PI and PT Ping
Level II assessment
EDGAR database
Computer-Based Attack
-PB
18. A group of penetration testers that assess the security of an organization - which is often unaware of the existence of the team or the exact assignment.
false rejection rate (FRR)
Destination Unreachable
node
red team
19. Ports 20/21
-sI
Contingency Plan
security kernel
FTP
20. A device that provides access between two or more networks. Gateways are typically used to connect dissimilar networks.
Annualized Loss Expectancy (ALE)
gateway
Trapdoor Function
Threat
21. A small Trojan program that listens on port 777.
key exchange protocol
Interior Gateway Protocol (IGP)
remote access
Tini
22. A widely used authentication protocol developed at the MassachusettsInstitute of Technology (MIT). Kerberos authentication uses tickets - Ticket Granting Service - and Key Distribution Center.
A series of messages sent by someone attempting to break into a computer to learn about the computer's network services.
sheepdip
Kerberos
nslookup
23. A security tool designed to protect a system or network against attacks by comparing traffic patterns against a list of both known attack signatures and general characteristics of how attacks may be carried out. Threats are rated and protective measu
intrusion prevention system (IPS)
Finding a directory listing and gaining access to a parent or root file for access to other files
Possession of access devices
steganography
24. White box test
inference attack
smart card
NetBSD
Internal access to the network
25. An attacker who breaks into computer systems with malicious intent - without the owner's knowledge or permission.
-oG
Black Hat
Banner Grabbing
port scanning
26. NSA
National Security Agency
Possession of access devices
heuristic scanning
Telnet
27. Terminal Access Controller Access-Control System. A remote authentication protocol that is used to communicate with an authentication server commonly used in Unix networks.
Confidentiality
Bluejacking
TACACS
social engineering
28. An attack that exploits the common mistake many people make when installing operating systems
DNS enumeration
operating system attack
smart card
Internet Assigned Number Authority (IANA)
29. A program or piece of code inserted into a system - usually covertly - with the intent of compromising the confidentiality - integrity - or availability of the victim's data - applications - or operating system. Malware consists of viruses - worms -
enumeration
Active Directory (AD)
Fast Ethernet
Malware
30. Transmitting one protocol encapsulated inside another protocol.
penetration testing
limitation of liability and remedies
Dumpster Diving
Tunneling
31. A NAT method in which multiple internal hosts - using private IP addressing - can be mapped through a single public IP address using the session IDs and port numbers. An internal global IP address can support in excess of 65 -000 concurrent TCP and U
Port Address Translation (PAT)
script kiddie
Rijndael
qualitative analysis
32. 18 U.S.C. 1029
Possession of access devices
Access Point (AP)
sidejacking
Open System Interconnection (OSI) Reference Model
33. ICMP Type/Code 8
-sI
Echo request
Wi-Fi
source routing
34. The cyclical practice of identifying - classifying - remediating - and mitigating vulnerabilities.
Vulnerability Management
Open System Interconnection (OSI) Reference Model
Redundant Array of Independent Disks (RAID)
Collision
35. Independent review and examination of records and activities to assess the adequacy of system controls - to ensure compliance with established policies and operational procedures - and to recommend necessary changes.
Replacing numbers in a url to access other files
audit
Fraud and related activity in connection with computers
Internet Control Message Protocol (ICMP)
36. A network traffic management technique designed to allow applications to specify the route a packet will take to a destination - regardless of what the route tables between the two systems say.
Brute-Force Password Attack
Pretty Good Privacy (PGP)
Replacing numbers in a url to access other files
source routing
37. A group of people - gathered together by a business entity - working to address a specific problem or goal.
Tiger Team
network interface card (NIC)
Interior Gateway Protocol (IGP)
Directory Traversal
38. Recording the time - normally in a log file - when an event happens or when information is created or modified.
Lightweight Directory Access Protocol (LDAP)
route
Wired Equivalent Privacy (WEP)
Timestamping
39. Ping Scan
-sP
null session
-oG
packet filtering
40. Sneaky scan timing
POP 3
serialize scans & 15 sec wait
Real application encompassing Trojan
NOP
41. An informed decision to accept the potential for damage to or loss of an IT asset.
Wi-Fi Protected Access (WPA)
Demilitarized Zone (DMZ)
risk acceptance
Rijndael
42. 18 U.S.C. 1030
session splicing
Fraud and related activity in connection with computers
Address Resolution Protocol (ARP)
ad hoc mode
43. A routing protocol developed to be used within a single organization.
FTP
Annualized Loss Expectancy (ALE)
Overwhelm CAM table to convert switch to hub mode
Interior Gateway Protocol (IGP)
44. The process of systematically testing each port on a firewall to map rules and determine accessible ports.
firewalking
remote procedure call (RPC)
802.11
hash
45. The result of using a private key to encrypt a hash value for identification purposes within a PKI system. The signature can be decoded by the originator's public key - verifying his identity and providing non-repudiation. A valid digital signature g
Trusted Computer System Evaluation Criteria (TCSEC)
Digital Signature
integrity
limitation of liability and remedies
46. Formerly Redundant Array of Inexpensive Disks; a technology that provides increased storage functions and reliability through redundancy. This is achieved by combining multiple disk drive components into a logical unit - where data is distributed acr
Transmission Control Protocol (TCP)
-sI
Redundant Array of Independent Disks (RAID)
Simple Mail Transfer Protocol (SMTP)
47. TCP Ping
DNS
-PT
Computer Emergency Response Team (CERT)
Virtual Private Network (VPN)
48. A network system of servers that translates numeric Internet Protocol (IP) addresses into human-friendly - hierarchical Internet addresses - and vice versa.
U P F
Virtual Local Area Network (VLAN)
honeypot
Domain Name System (DNS)
49. A mathematical operation requiring two binary inputs: If the inputs match - the output is a 0 - otherwise it is a 1.
Filter
XOR Operation
false rejection rate (FRR)
-sA
50. ICMP Type/Code 3
Destination Unreachable
Warm Site
Address Resolution Protocol (ARP)
Crossover Error Rate (CER)
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests