SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. FIN Scan
network tap
-sF
Bluetooth
Mantrap
2. Calculations of two components of risk: R - the magnitude of the potential loss (L) - and the probability - p - that the loss will occur.
SNMP
--randomize_hosts -O OS fingerprinting
quantitative risk assessment
Internet Assigned Number Authority (IANA)
3. A computer network confined to a relatively small area - such as a single building or campus - in which devices connect through high-frequency radio waves using IEEE standard 802.11.
Biometrics
Wireless Local Area Network (WLAN)
identity theft
Wide Area Network (WAN)
4. An agreement between the penetration tester and the client detailing the activities the tester is permitted to perform.
spoofing
Written Authorization
Baseline
Asynchronous
5. A penetration test in which the ethical hacker has limited knowledge of the intended target(s). Designed to simulate an internal - but non-systemadministrator-level attack.
gray box testing
POP 3
A S
Telnet
6. A method for detecting malicious code on a computer where the files are compared to signatures of known viruses stored in a database.
Buffer
Real application encompassing Trojan
signature scanning
Decryption
7. A network administration command-line tool available for many operating systems for querying the Domain Name System (DNS) to obtain domain name or IP address mappings or any other specific DNS record.
Telnet
nslookup
Electronic Code Book (ECB)
script kiddie
8. Microsoft SID 500
Network Address Translation (NAT)
Target Of Engagement (TOE)
Vulnerability Management
Local Administrator
9. A VPN tunneling protocol with encryption. PPTP connects two nodes in a VPN by using one TCP port for negotiation and authentication and one IP protocol for data transfer.
session hijacking
Point-to-Point Tunneling Protocol (PPTP)
Digital Signature
HTTP
10. A number assigned during TCP startup sessions that tracks how much information has been moved. This number is used by hackers when hijacking sessions.
A R
Defines legal email marketing
initial sequence number (ISN)
Data Encryption Standard (DES)
11. The rate at which a biometric system will incorrectly identify an unauthorized individual and allow them access (see false negative).
False Acceptance Rate (FAR)
Web Spider
Accountability
Cache
12. A routing protocol developed to be used within a single organization.
Rijndael
Active Attack
Interior Gateway Protocol (IGP)
sniffer
13. Wireless LAN standards created by IEEE. 802.11a runs at up to 54Mbps at 5GHz - 802.11b runs at 11Mbps at 2.4GHz - 802.11g runs at 54Mbps at 2.4GHz - and 802.11n can run upwards of 150MBps.
802.11
encapsulation
remote access
Community String
14. The process of using easily accessible DNS records to map a target network's internal hosts.
-PS
-sW
Telnet
DNS enumeration
15. In penetration testing - enumeration is the act of querying a device or network segment thoroughly and systematically for information.
enumeration
reconnaissance
White Box Testing
security defect
16. The directory service created by Microsoft for use on itsnetworks. Provides a variety of network services using Lightweight Directory Access Protocol (LDAP) - Kerberos-based authentication - and single sign-on for user access to network-based resourc
Written Authorization
Active Directory (AD)
encapsulation
Traceroute
17. An organized collection of data.
rootkit
Database
Authentication - Authorization - and Accounting (AAA)
initial sequence number (ISN)
18. An attack where the hacker repeats a portion of a cryptographic exchange in hopes of fooling the system into setting up a communications channel.
No previous knowledge of the network
audit
replay attack
-PS
19. A wireless access point that has either been installed on a secure company network without explicit authorization from a local network administrator - or has been created to allow a hacker to conduct a man-in-the-middle attack.
-sP
Wrapper
rogue access point
Tumbling
20. A list of IP addresses and corresponding MAC addresses stored on a local computer.
Address Resolution Protocol (ARP) table
protocol stack
proxy server
Black Box Testing
21. An API that provides services related to the OSI model's Session layer - allowing applications on separate computers to communicate over a LAN.
Network Basic Input/Output System (NetBIOS)
Time Bomb
Vulnerability Management
Multipurpose Internet Mail Extensions (MIME)
22. Port 31337
Back orifice
Availability
heuristic scanning
port scanning
23. The monetary loss that can be expected for an asset due to risk over a one-year period. ALE is the product of the annual rate of occurrence (ARO) and the single loss expectancy (SLE). It is mathematically expressed as ALE = ARO
human-based social engineering
Annualized Loss Expectancy (ALE)
Multipurpose Internet Mail Extensions (MIME)
-sL
24. An evaluation consisting of a document review - interviews - and demonstrations - as well as vulnerability scans and hands-on testing.
White Box Testing
stream cipher
Bluetooth
Level II assessment
25. A suite of protocols used for securing Internet Protocol (IP) communications by authenticating and encrypting each IP packet of a communication session. This suite includes protocols for establishing mutual authentication between agents at the sessio
Internet Protocol Security (IPSec) architecture
POP 3
Droppers
risk acceptance
26. A mode of operation for a block cipher - with the characteristic that each possible block of plaintext has a defined corresponding ciphertext value - and vice versa
Copyright
Electronic Code Book (ECB)
War Chalking
security bulletins
27. A device providing temporary - on-demand - point-to-point network access to users.
session hijacking
logic bomb
network access server
CNAME record
28. The default network authentication suite of protocols for Windows NT 4.0
serial scan & 300 sec wait
Access Control List (ACL)
NT LAN Manager (NTLM)
Vulnerability Assessment
29. Monitoring of telephone or Internet conversations - typically by covert means.
Cracker
ring topology
service level agreements (SLAs)
Wiretapping
30. The steps taken to gather evidence and information on the targets you wish to attack.
reconnaissance
-p <port ranges>
identity theft
Cracker
31. PI and PT Ping
ad hoc mode
Request for Comments (RFC)
security incident response team (SIRT)
-PB
32. The act of dialing all numbers within an organization to discover open modems.
War Dialing
Domain Name
Telnet
protocol stack
33. A wireless LAN security standard developed by IEEE. Requires Temporal Key Integrity Protocol (TKIP) and Advanced Encryption Standard (AES).
halo effect
802.11 i
forwarding
Defines legal email marketing
34. MAC Flooding
Active Fingerprinting
rootkit
Domain Name
Overwhelm CAM table to convert switch to hub mode
35. A tool that helps a company to compare its actual performance with its potential performance.
Internet Assigned Number Authority (IANA)
human-based social engineering
gap analysis
Cache
36. Whether purposeful or the result of malware or other attack - a backdoor is a hidden capability in a system or program for bypassing normal computer authentication systems.
Backdoor
A series of messages sent by someone attempting to break into a computer to learn about the computer's network services.
network access server
enumeration
37. Method used by antivirus software to detect new - unknown viruses that have not yet been identified; based on a piece-by-piece examination of a program - looking for a sequence or sequences of instructions that differentiate the virus from 'normal' p
heuristic scanning
Vulnerability Management
Address Resolution Protocol (ARP) table
security incident response team (SIRT)
38. A self-replicating - self-propagating - self-contained program that uses networking mechanisms to spread itself.
qualitative analysis
Worm
Cryptographic Key
Temporal Key Integrity Protocol (TKIP)
39. A text file stored within a browser by a web server that maintains information about the connection. Cookies are used to store information to maintain a unique but consistent surfing experience - but can also contain authentication parameters. Cookie
asynchronous transmission
Console Port
Cookie
Digital Watermarking
40. Metamorphic Virus
hardware keystroke logger
Fiber Distributed Data Interface (FDDI)
Self Replicating
spyware
41. ICMP Netmask
security incident response team (SIRT)
-PM
Secure Multipurpose Mail Extension (S/MIME)
queue
42. A card with a built-in microprocessor and memory used for identification or financial transactions. The card transfers data to and from a central computer when inserted into a reader.
smart card
Common Internet File System/Server Message Block
Hacks without permission
Authentication Header (AH)
43. NSA
private network address
National Security Agency
War Chalking
R
44. Port 88
Access Creep
Timestamping
Block Cipher
Kerberos
45. A virus that plants itself in a system's boot sector and infects the master boot record.
Boot Sector Virus
intranet
Simple Mail Transfer Protocol (SMTP)
asynchronous transmission
46. The means by which a recipient of a message can ensure the identity of the sender and that neither party can deny having sent or received the message. The most common method is through digital certificates.
Competitive Intelligence
Network Basic Input/Output System (NetBIOS)
Institute of Electrical and Electronics Engineers (IEEE)
non-repudiation
47. Polite scan timing
serialize scans & 0.4 sec wait
fully qualified domain name (FQDN)
quantitative risk assessment
Request for Comments (RFC)
48. A type 0 ICMP message used to reply to ECHO requests. Used with ping to verify network layer connectivity between hosts.
forwarding
Assessment
risk
ECHO reply
49. A systematic process for the assessment of security vulnerabilities.
A R
INFOSEC Assessment Methodology (IAM)
Extensible Authentication Protocol (EAP)
Zombie
50. A network architecture framework developed by ISO that describes the communications process between two systems across the Internet in seven distinct layers.
Open System Interconnection (OSI) Reference Model
Trapdoor Function
Bluetooth
CIA triangle