SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Port 23
Audit Data
Telnet
heuristic scanning
limitation of liability and remedies
2. A unit of information formatted according to specific protocols that allows precise transmittal of data from one network node to another. Also called a datagram or data packet - a packet contains a header (container) and a payload (contents). Any IP
network access server
-PM
Level III assessment
packet
3. nmap
-sW
Finger
-p <port ranges>
signature scanning
4. A suite of protocols used for securing Internet Protocol (IP) communications by authenticating and encrypting each IP packet of a communication session. This suite includes protocols for establishing mutual authentication between agents at the sessio
Internet Protocol Security (IPSec) architecture
File Transfer Protocol (FTP)
Serial Line Internet Protocol (SLIP)
red team
5. Port 110
POP 3
-sS
Bit Flipping
-p <port ranges>
6. Sending unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobile phones - PDAs - or laptop computers.
Overwhelm CAM table to convert switch to hub mode
802.11 i
The automated process of proactively identifying vulnerabilities of computing systems present in a network
Bluejacking
7. A fully operational off-site data-processing facility equipped with hardware and system software to be used in the event of a disaster.
Audit Data
hot site
Ciphertext
Digital Signature
8. Content Addressable Memory table. Holds all the MAC-address-to-port mappings on a switch.
false rejection rate (FRR)
Secure Multipurpose Mail Extension (S/MIME)
enumeration
CAM table
9. A computer security expert who performs security audits and penetration tests against systems or network segments - with the owner's full knowledge and permission - in an effort to increase security.
Real application encompassing Trojan
DNS
Kerberos
Ethical Hacker
10. An API that provides services related to the OSI model's Session layer - allowing applications on separate computers to communicate over a LAN.
protocol stack
Tunnel
Simple Mail Transfer Protocol (SMTP)
Network Basic Input/Output System (NetBIOS)
11. Software or firmware intended to perform an unauthorized process that will have an adverse impact on the confidentiality - integrity - or availability of an information system. A virus - worm - Trojan horse - or other code-based entity that infects a
private key
Authentication Header (AH)
Malicious code
Google hacking
12. A storage buffer that transparently stores data so future requests for the same data can be served faster.
Cache
Wired Equivalent Privacy (WEP)
gap analysis
qualitative analysis
13. The combination of all IT assets - resources - components - and systems.
false rejection rate (FRR)
Information Technology (IT) infrastructure
Cookie
Internet Protocol Security (IPSec) architecture
14. The process of systematically testing each port on a firewall to map rules and determine accessible ports.
A S
firewalking
gray hat
route
15. A small Trojan program that listens on port 777.
Password Authentication Protocol (PAP)
service level agreements (SLAs)
Temporal Key Integrity Protocol (TKIP)
Tini
16. A unique numerical string - created by a hashing algorithm on a given piece of data - used to verify data integrity. Generally hashes are used to verify the integrity of files after download (comparison to the hash value on the site before download)
Traceroute
Wide Area Network (WAN)
hash
Multipartite virus
17. FIN Scan
security defect
Written Authorization
Computer Emergency Response Team (CERT)
-sF
18. Defined in RFC 826 - ARP is a protocol used to map a known IP address to a physical (MAC) address.
Address Resolution Protocol (ARP)
spyware
Droppers
ad hoc mode
19. A file system used by the Mac OS.
Hierarchical File System (HFS)
Application-Level Attacks
shrink-wrap code attacks
Tunneling Virus
20. A routing protocol developed to be used within a single organization.
Exposure Factor
Interior Gateway Protocol (IGP)
Data Link layer
Internet Protocol (IP)
21. UDP Scan
shrink-wrap code attacks
War Driving
Internet Assigned Number Authority (IANA)
-sU
22. A free and popular version of the Unix operating system.
FreeBSD
social engineering
hot site
MD5
23. A communications protocol used for browsing the Internet.
Administratively Prohibited
Hypertext Transfer Protocol (HTTP)
DNS enumeration
penetration testing
24. Terminal Access Controller Access-Control System. A remote authentication protocol that is used to communicate with an authentication server commonly used in Unix networks.
-sA
Active Directory (AD)
TACACS
ping sweep
25. A software license agreement; a contract between the 'licensor' and purchaser establishing the right to use the software.
End User Licensing Agreement (EULA)
-p <port ranges>
A procedure for identifying active hosts on a network.
Tini
26. ex 02
S
HIDS
-sV
Third Party
27. A business - government agency - or educational institution that provides access to the Internet.
Electronic Code Book (ECB)
Internet Protocol Security (IPSec) architecture
Zenmap
Internet service provider (ISP)
28. An attack in which the hacker can derive information from the ciphertext without actually decoding it. Sensitive information can be considered compromised if an adversary can infer its real value with a high level of confidence.
false rejection rate (FRR)
patch
NOP
inference attack
29. NSA
No previous knowledge of the network
FreeBSD
National Security Agency
Lightweight Directory Access Protocol (LDAP)
30. An Application layer protocol used primarily by Microsoft Windows to provide shared access to printers - files - and serial ports. It also provides an authenticated interprocess communication mechanism.
R
Redundant Array of Independent Disks (RAID)
Common Internet File System/Server Message Block
GET
31. The steps taken to gather evidence and information on the targets you wish to attack.
reconnaissance
Virus
Audit Data
protocol
32. The act of using numerous electronic serial numbers on a cell phone until a valid number is located.
self encrypting
Tumbling
asynchronous transmission
Information Technology (IT) asset valuation
33. A symmetric - block-cipher data-encryption standard that uses a variablelength key that can range from 32 bits to 448 bits.
Blowfish
node
sidejacking
rule-based access control
34. A decision to reduce the potential for damage to or loss of an IT asset by taking some type of action
parallel scan & 75 sec timeout & 0.3 sec/probe
risk avoidance
Service Set Identifier (SSID)
Self Replicating
35. Port 135
Network Address Translation (NAT)
parallel scan & 300 sec timeout & 1.25 sec/probe
-PB
RPC-DCOM
36. A situation in which an IDS or other sensor triggers on an event as an intrusion attempt - when it was actually legitimate traffic.
false rejection rate (FRR)
false negative
intrusion detection system (IDS)
Annualized Loss Expectancy (ALE)
37. One or more locations from which control is exercised over a computer - television broadcast - or telecommunications network.
network operations center (NOC)
network interface card (NIC)
Timestamping
-oX
38. The process of using an application to remotely identify open ports on a system (for example - whether systems allow connections through those ports).
Buffer Overflow
Confidentiality
port scanning
nslookup
39. Confidentiality - Integrity - and Availability are the three aspects of security and make up the triangle.
RxBoot
remote access
CIA triangle
Warm Site
40. A device that provides access between two or more networks. Gateways are typically used to connect dissimilar networks.
Data Encryption Standard (DES)
Virus
Demilitarized Zone (DMZ)
gateway
41. Port 389
LDAP
Application Layer
packet filtering
hacktivism
42. The level of importance assigned to an IT asset
-PS
Information Technology (IT) asset criticality
Baseline
Back orifice
43. A Unix-like computer operating system descending from the BSD. Open-BSD includes a number of security features absent or optional in other operating systems.
OpenBSD
impersonation
Time Bomb
Rijndael
44. The organization that governs the Internet's top-level domains - IP address allocation - and port number assignments.
service level agreements (SLAs)
-oX
Internet Assigned Number Authority (IANA)
session hijacking
45. CAN-SPAM
serialize scans & 0.4 sec wait
null session
Defines legal email marketing
Web Spider
46. A method of network traffic filtering that monitors the entire communications process - including the originator of the session and from which direction it started.
serialize scans & 15 sec wait
Crossover Error Rate (CER)
Bluesnarfing
stateful packet filtering
47. Controls to detect anomalies or undesirable events occurring on a system.
Telnet
Client
Smurf attack
Detective Controls
48. In computer security - this is an algorithm that uses separate keys for encryption and decryption.
User Datagram Protocol (UDP)
Asymmetric Algorithm
identity theft
Transport Layer Security (TLS)
49. TCP SYN Scan
Boot Sector Virus
-sS
Open System Interconnection (OSI) Reference Model
Database
50. A data encryption/decryption program often used for e-mail and file storage.
-sF
Trojan Horse
Pretty Good Privacy (PGP)
-oX