SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Layer 6 of the OSI reference model. The Presentation layer ensures information sent by the Application layer of the sending system will be readable by the Application layer of the receiving system.
R
Presentation layer
DNS enumeration
-sP
2. Security measures - such as a locked door - perimeter fence - or security guard - to prevent or deter physical access to a facility - resource - or information stored on physical media.
MAC filtering
personal identification number (PIN)
physical security
non-repudiation
3. A method of falsely identifying the source of data packets; often used by hackers to make it difficult to trace where an attack originated.
nslookup
-sP
spoofing
Acceptable Use Policy (AUP)
4. nmap
-p <port ranges>
initial sequence number (ISN)
site survey
security breach or security incident
5. An inspection of a place where a company or individual proposes to work - to gather the necessary information for a design or risk assessment.
Vulnerability Scanning
intrusion prevention system (IPS)
site survey
Tini
6. A type of DNS transfer - where all records from an SOA are transmitted to the requestor. Zone transfers have two options: full (opcode AXFR) and incremental (IXFR).
No previous knowledge of the network
Zone transfer
Cache
segment
7. A mode of operation for a block cipher - with the characteristic that each possible block of plaintext has a defined corresponding ciphertext value - and vice versa
-sP
Electronic Code Book (ECB)
Droppers
hybrid attack
8. A security objective that ensures a resource can be accessed only by authorized users. This is also the property that sensitive information is not disclosed to unauthorized individuals - entities - or processes.
Confidentiality
National Security Agency
-PP
RPC-DCOM
9. SYN Ping
SOA record
router
-PS
Possession of access devices
10. An anonymous connection to an administrative share (IPC$) on a Windows machine. Null sessions allow for enumeration of Windows machines - among other attacks.
null session
802.11
Wrapper
-b
11. A social-engineering attack that manipulates the victim into calling the attacker for help.
reverse social engineering
risk
Data Encryption Standard (DES)
pattern matching
12. Any circumstance or event with the potential to adversely impact organizationaloperations - organizational assets - or individuals through an information system via unauthorized access - destruction - disclosure - modification of information - and/or
Threat
ring topology
Bluejacking
Due Diligence
13. A legal limit on the amount of financial liability and remedies the organization is responsible for taking on.
Domain Name System (DNS)
limitation of liability and remedies
nslookup
fragmentation
14. An e-mail protection method using a secret message or image that can be referenced on any official communication with the site; if an e-mail is received without the image or message - the recipient knows it is not legitimate.
Sign in Seal
Authentication - Authorization - and Accounting (AAA)
Event
Possession of access devices
15. A type of denial-of-service attack where a hacker sends thousands of SYN packets to the target with spoofed IP addresses.
Backdoor
SYN attack
CIA triangle
HTTP tunneling
16. Drawing symbols in public places to alert others to an open Wi-Fi network. War chalking can include the SSIDs - administrative passwords to APs - and other information.
SSH
FreeBSD
War Chalking
GET
17. Black box test
Local Administrator
Threat
Back orifice
No previous knowledge of the network
18. Management policy and procedures designed to maintain or restore business operations - including computer operations - possibly at an alternate location - in the event of emergencies - system failures - or disaster.
Countermeasures
Contingency Plan
A series of messages sent by someone attempting to break into a computer to learn about the computer's network services.
firewalking
19. Using conversation or some other interaction between people to gather useful information.
Digital Watermarking
Overwhelm CAM table to convert switch to hub mode
Computer Emergency Response Team (CERT)
human-based social engineering
20. In penetration testing - enumeration is the act of querying a device or network segment thoroughly and systematically for information.
enumeration
Defines legal email marketing
Overwhelm CAM table to convert switch to hub mode
Ciphertext
21. Also known as a public key certificate - this is an electronic file that is used to verify a user's identity - providing non-repudiation throughout the sys-tem. Certificates contain the entity's public key - serial number - version - subject - algori
Virus
Three-Way (TCP) Handshake
Digital Certificate
Lightweight Directory Access Protocol (LDAP)
22. The process of using easily accessible DNS records to map a target network's internal hosts.
piggybacking
DNS enumeration
Application-Level Attacks
service level agreements (SLAs)
23. The contents of a packet. A system attack requires the attacker to deliver a malicious payload that is acted upon and executed by the system.
Data Encryption Standard (DES)
payload
smart card
gray box testing
24. An attacker who breaks into computer systems with malicious intent - without the owner's knowledge or permission.
Black Hat
Point-to-Point Tunneling Protocol (PPTP)
public key infrastructure (PKI)
Electronic Code Book (ECB)
25. Any item of value or worth to an organization - whether physical or virtual.
Asset
Point-to-Point Tunneling Protocol (PPTP)
phishing
promiscuous mode
26. Formerly Redundant Array of Inexpensive Disks; a technology that provides increased storage functions and reliability through redundancy. This is achieved by combining multiple disk drive components into a logical unit - where data is distributed acr
SSH
Redundant Array of Independent Disks (RAID)
-sU
Simple Mail Transfer Protocol (SMTP)
27. Calculations of two components of risk: R - the magnitude of the potential loss (L) - and the probability - p - that the loss will occur.
quantitative risk assessment
Detective Controls
rootkit
War Chalking
28. Idlescan
-sI
Methodology
site survey
inference attack
29. A TCP flag notifying an originating station that the preceding packet (or packets) has been received.
Acknowledgment (ACK)
Real application encompassing Trojan
Third Party
Hypertext Transfer Protocol Secure (HTTPS)
30. A network administration command-line tool available for many operating systems for querying the Domain Name System (DNS) to obtain domain name or IP address mappings or any other specific DNS record.
-sV
Ethernet
nslookup
Malicious code
31. Ports 20/21
802.11
FTP
Trusted Computer Base (TCB)
LDAP
32. Metamorphic Virus
Macro virus
RPC-DCOM
Decryption
Self Replicating
33. A computer file system architecture used in Windows - OS/2 - and most memory cards.
Serial Line Internet Protocol (SLIP)
File Allocation Table (FAT)
Hypertext Transfer Protocol (HTTP)
Virus Hoax
34. The central part of a computer or communications system hardware firmware - and software that implements the basic security procedures for controlling access to system resources.
security kernel
Multipartite virus
FreeBSD
Reconnaissance - Scanning - Gaining Access - Maintaining Access - Covering Tracks
35. Baseband LAN specification developed by Xerox Corporation - Intel - and Digital Equipment Corporation. One of the least expensive - most widely deployed networking standards; uses the CSMA/CD method of media access control.
risk acceptance
Ethernet
Uniform Resource Locator (URL)
White Box Testing
36. A decision to reduce the potential for damage to or loss of an IT asset by taking some type of action
Level III assessment
Institute of Electrical and Electronics Engineers (IEEE)
risk avoidance
-sP
37. An information assurance strategy in which multiple layers of defense are placed throughout an Information Technology system.
Warm Site
stream cipher
Authentication Header (AH)
Defense in Depth
38. The monetary value expected from the occurrence of a risk on an asset. It is mathematically expressed as single loss expectancy (SLE) = asset value (AV)
Presentation layer
single loss expectancy (SLE)
-oA
impersonation
39. A group of people - gathered together by a business entity - working to address a specific problem or goal.
Tiger Team
Tunneling Virus
heuristic scanning
Possession of access devices
40. Port 22
Warm Site
SSH
Covert Channel
hardware keystroke logger
41. A cyber attacker who acts without permission from - and gives prior notice to - the resource owner. Also known as a malicious hacker.
Baseline
Hierarchical File System (HFS)
Cracker
Destination Unreachable
42. Attacks that take advantage of the built-in code and scripts most off-the-shelf applications come with.
symmetric algorithm
Hacks without permission
shrink-wrap code attacks
Simple Object Access Protocol (SOAP)
43. A non-self-replicating program that appears to have a useful purpose - but in reality has a different - malicious purpose.
Trojan Horse
security controls
Electronic serial number
stream cipher
44. Port 110
fragmentation
POP 3
National Security Agency
User Datagram Protocol (UDP)
45. Also known as a digital certificate - this is an electronic file used to verify a user's identity - providing non-repudiation throughout the system It is also a set of data that uniquely identifies an entity. Certificates contain the entity's public
Certificate
honeynet
NOP
non-repudiation
46. Hex 29
Authorization
--randomize_hosts -O OS fingerprinting
role-based access control
U P F
47. A communications path - such as the Internet - authorized for data transmission within a computer system or network.
Detective Controls
Simple Network Management Protocol (SNMP)
overt channel
parallel scan & 300 sec timeout & 1.25 sec/probe
48. Hex 10
Information Technology (IT) asset criticality
Self Replicating
enumeration
A
49. Sending packets or requests to another system to gain information to be used to identify weaknesses and protect the system from attacks.
integrity
-oX
encryption
Vulnerability Scanning
50. A denial-of-service attack where the attacker sends a ping to the network's broadcast address from the spoofed IP address of the target. All systems in the subnet then respond to the spoofed address - eventually flooding the device.
reverse lookup; reverse DNS lookup
remote procedure call (RPC)
-oG
Smurf attack