SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A cyber attacker who acts without permission from - and gives prior notice to - the resource owner. Also known as a malicious hacker.
Cracker
suicide hacker
Virus
Secure Multipurpose Mail Extension (S/MIME)
2. Transmitting one protocol encapsulated inside another protocol.
Tunneling
Droppers
Transport Layer Security (TLS)
false negative
3. Network Scanning
honeynet
false rejection rate (FRR)
A procedure for identifying active hosts on a network.
Simple Network Management Protocol (SNMP)
4. A collection of historical records or the place where they are kept. In computing - an archive generally refers to backup copies of logs and/or data.
Timestamping
Temporal Key Integrity Protocol (TKIP)
Archive
Rijndael
5. A documented process for a procedure designed to be consistent - repeatable - and accountable.
Methodology
Bastion host
Wi-Fi Protected Access (WPA)
gateway
6. A symmetric - block-cipher data-encryption standard that uses a variablelength key that can range from 32 bits to 448 bits.
Traceroute
Blowfish
Level III assessment
serial scan & 300 sec wait
7. Xmas Tree scan
-sL
Internet Control Message Protocol (ICMP)
-sX
-b
8. ICMP Netmask
-PM
Acknowledgment (ACK)
suicide hacker
Redundant Array of Independent Disks (RAID)
9. A security tool designed to protect a system or network against attacks by comparing traffic patterns against a list of both known attack signatures and general characteristics of how attacks may be carried out. Threats are rated and reported.
intrusion detection system (IDS)
stateful packet filtering
CIA triangle
physical security
10. The ability to trace actions performed on a system to a specific user or system entity.
Routing Protocol
Accountability
Three-Way (TCP) Handshake
Ethical Hacker
11. A method of falsely identifying the source of data packets; often used by hackers to make it difficult to trace where an attack originated.
Simple Mail Transfer Protocol (SMTP)
spoofing
Vulnerability
Request for Comments (RFC)
12. The level of importance assigned to an IT asset
Block Cipher
steganography
Level II assessment
Information Technology (IT) asset criticality
13. A network administration command-line tool available for many operating systems for querying the Domain Name System (DNS) to obtain domain name or IP address mappings or any other specific DNS record.
quantitative risk assessment
Pretty Good Privacy (PGP)
nslookup
Virus Hoax
14. A type 0 ICMP message used to reply to ECHO requests. Used with ping to verify network layer connectivity between hosts.
intrusion prevention system (IPS)
ECHO reply
identity theft
Simple Mail Transfer Protocol (SMTP)
15. Sneaky scan timing
security incident response team (SIRT)
key exchange protocol
Vulnerability Scanning
serialize scans & 15 sec wait
16. Polymorphic Virus
self encrypting
--randomize_hosts -O OS fingerprinting
Zombie
INFOSEC Assessment Methodology (IAM)
17. An informed decision to accept the potential for damage to or loss of an IT asset.
Bug
Service Set Identifier (SSID)
risk acceptance
session splicing
18. A function that is easy to compute in one direction - yet believed to be difficult to compute in the opposite direction (finding its inverse) without special information - called the 'trapdoor.' Widely used in cryptography.
Three-Way (TCP) Handshake
Access Control List (ACL)
fragmentation
Trapdoor Function
19. A sublayer of layer 2 of the OSI model - the Data Link layer. It provides addressing and channel access control mechanisms that enable several terminals or network nodes to communicate within a multipoint network.
-sU
Media Access Control (MAC)
session hijacking
Ethical Hacker
20. Set of tools (applications or code) that enables administrator-level accessto a computer or computer network and is designed to obscure the fact that the system has been compromised. Rootkits are dangerous malware entities that provide administrator
qualitative analysis
Internal access to the network
rootkit
reverse social engineering
21. A U.S. Department of Defense (DoD) standard that sets basic requirements for assessing the effectiveness of computer security controls built into a computer system.
Trusted Computer System Evaluation Criteria (TCSEC)
Transmission Control Protocol (TCP)
Virus
human-based social engineering
22. A Canonical Name record within DNS - used to provide an alias for a domain name.
Multipurpose Internet Mail Extensions (MIME)
Wrapper
Time To Live (TTL)
CNAME record
23. When an authorized person allows (intentionally or unintentionally) someone to pass through a secure door - despite the fact that the intruder does not have a badge.
Buffer
piggybacking
public key
The automated process of proactively identifying vulnerabilities of computing systems present in a network
24. Transmission using channels or frequencies outside those normally used for data transfer; often used for error reporting.
Domain Name
Administratively Prohibited
out-of-band signaling
spyware
25. A document describing information security guidelines - policies - procedures - and standards.
Data Encryption Standard (DES)
Information Technology (IT) security architecture and framework
HTTP
Secure Multipurpose Mail Extension (S/MIME)
26. IP Protocol Scan
-sO
integrity
Authentication - Authorization - and Accounting (AAA)
Man-in-the-middle attack
27. A biometric device that uses pattern-recognition techniques based on images of the irises of an individual's eyes.
iris scanner
suicide hacker
security defect
Digital Signature
28. A widely used authentication protocol developed at the MassachusettsInstitute of Technology (MIT). Kerberos authentication uses tickets - Ticket Granting Service - and Key Distribution Center.
DNS
Kerberos
Zone transfer
Certificate Authority (CA)
29. A program designed to execute at a specific time to release malicious code onto the computer system or network.
Time Bomb
War Driving
-PT
passive attack
30. Sending packets or requests to another system to gain information to be used to identify weaknesses and protect the system from attacks.
International Organization for Standardization (ISO)
Distributed DoS (DDoS)
Vulnerability Scanning
Transport Layer Security (TLS)
31. An attack in which a hacker steps between two ends of an already-established communication session and uses specialized tools to guess sequence numbers to take over the channel.
key exchange protocol
session hijacking
FTP
queue
32. Traffic-passing technique used by bridges and switches in which traffic received on an interface is sent out all interfaces on the device except the interface on which the information was originally received. Traffic on a switch is flooded when it is
Acknowledgment (ACK)
flood
Detective Controls
false rejection rate (FRR)
33. ACK Scan
SNMP
-sA
Rijndael
hash
34. The act of secretly listening to the private conversations of others without their consent. This can also be done over telephone lines (wiretapping) - e-mail - instant messaging - and other methods of communication considered private
Eavesdropping
Cold Site
Community String
Zenmap
35. UDP Scan
-sU
Data Encryption Standard (DES)
-sP
Baseline
36. An extensible mechanism for e-mail. A variety of MIME types exist for sending content such as audio - binary - or video using the Simple Mail Transfer Protocol (SMTP).
source routing
human-based social engineering
self encrypting
Multipurpose Internet Mail Extensions (MIME)
37. A command that instructs the system processor to do nothing. Many overflow attacks involve stringing several NOP operations together (known as a NOP sled).
CIA triangle
Biometrics
Virus Hoax
NOP
38. Used for exchanging structured information - such as XML-based messages - in the implementation of web services
Worm
Vulnerability Assessment
single loss expectancy (SLE)
Simple Object Access Protocol (SOAP)
39. A data encryption/decryption program often used for e-mail and file storage.
Authentication Header (AH)
SNMP
Pretty Good Privacy (PGP)
Asymmetric Algorithm
40. A defined measure of service within a network system
Kerberos
quality of service (QoS)
security breach or security incident
remote procedure call (RPC)
41. FIN Scan
nslookup
Annualized Loss Expectancy (ALE)
quantitative risk assessment
-sF
42. An encryption standard designed by Joan Daemen and Vincent Rijmen. Chosen by a NIST contest to be the Advanced Encryption Standard (AES).
Asset
quality of service (QoS)
Rijndael
GET
43. Any kind of connection that allows you to see all traffic passing by. Generally used in reference to a NIDS (network-based IDS) to monitor all traffic.
network tap
Confidentiality
Competitive Intelligence
Level III assessment
44. Policy stating what users of a system can and cannot do with the organization's assets.
Acceptable Use Policy (AUP)
Level II assessment
MD5
honeypot
45. An attack where the hacker repeats a portion of a cryptographic exchange in hopes of fooling the system into setting up a communications channel.
Algorithm
Cold Site
replay attack
segment
46. 18 U.S.C. 1029
Temporal Key Integrity Protocol (TKIP)
protocol stack
Possession of access devices
reverse lookup; reverse DNS lookup
47. A unit of information formatted according to specific protocols that allows precise transmittal of data from one network node to another. Also called a datagram or data packet - a packet contains a header (container) and a payload (contents). Any IP
Buffer Overflow
SYN attack
nslookup
packet
48. A unique numerical string - created by a hashing algorithm on a given piece of data - used to verify data integrity. Generally hashes are used to verify the integrity of files after download (comparison to the hash value on the site before download)
MAC filtering
Malware
hash
Fast Ethernet
49. Activities to determine the extent to which a security control is implemented correctly - operating as intended - and producing the desired outcome with respect to meeting the security requirements for the system.
Assessment
-oX
spoofing
SID
50. 18 U.S.C. 1030
A series of messages sent by someone attempting to break into a computer to learn about the computer's network services.
Active Attack
Fraud and related activity in connection with computers
Multipurpose Internet Mail Extensions (MIME)