SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. ICMP Type/Code 0-0
Client
Hypertext Transfer Protocol Secure (HTTPS)
Echo Reply
suicide hacker
2. A type of denial-of-service attack where a hacker sends thousands of SYN packets to the target with spoofed IP addresses.
spam
Crossover Error Rate (CER)
SYN attack
Tunnel
3. Text or data in its encrypted form; the result of plaintext being input into a cryptographic algorithm.
network interface card (NIC)
Collision
Ciphertext
Trusted Computer Base (TCB)
4. A unique hostname that is used to identify resources on the Internet. Domain names start with a root (.) - then add a top level (.com - .gov - or .mil - for example) - and a given name space.
halo effect
port knocking
Certificate
Domain Name
5. A technology that establishes a tunnel to create a private - dedicated - leased-line network over the Internet. The data is encrypted so it's readable only by the sender and receiver. Companies commonly use VPNs to allow employees to connect securely
TACACS
Detective Controls
Virtual Private Network (VPN)
shoulder surfing
6. Layer 2 of the OSI reference model. This layer provides reliable transit of data across a physical link. The Data Link layer is concerned with physical addressing - network topology - access to the network medium - error detection - sequential delive
Cache
Syslog
Data Link layer
-sA
7. The rate at which a biometric system will incorrectly reject an access attempt by an authorized user.
Asset
Annualized Loss Expectancy (ALE)
Level II assessment
false rejection rate (FRR)
8. The lack of clocking (imposed time ordering) on a bit stream.
Certificate Authority (CA)
sheepdip
Bluesnarfing
Asynchronous
9. A person or entity indirectly involved in a relationship between two principles.
rootkit
Third Party
Wi-Fi Protected Access (WPA)
Countermeasures
10. A point-to-point connection between two endpoints created to exchangedata. Typically a tunnel is either an encrypted connection - or a connection using a protocol in a method for which it was not designed. An encrypted connection forms a point-to-poi
Tunnel
secure channel
Transmission Control Protocol (TCP)
White Box Testing
11. Used to find the domain name associated with an IP address; the opposite of a DNS lookup.
Boot Sector Virus
Wi-Fi
reverse lookup; reverse DNS lookup
Minimum acceptable level of risk
12. Vulnerability Scanning
Common Internet File System/Server Message Block
security controls
The automated process of proactively identifying vulnerabilities of computing systems present in a network
Access Creep
13. A small Trojan program that listens on port 777.
RID Resource identifier
Tini
Directory Traversal
-PT
14. A network deployed as a trap to detect - deflect - or deter unauthorized use of information systems.
honeynet
Information Technology Security Evaluation Criteria (ITSEC)
Access Creep
Vulnerability Scanning
15. Provides data encryption for IEEE 802.11 wireless networks so data can only be decrypted by the intended recipients.
identity theft
Wi-Fi Protected Access (WPA)
Lightweight Directory Access Protocol (LDAP)
Dumpster Diving
16. A unit of information formatted according to specific protocols that allows precise transmittal of data from one network node to another. Also called a datagram or data packet - a packet contains a header (container) and a payload (contents). Any IP
session hijacking
Echo request
packet
RxBoot
17. A computer system that performs tasks dictated by an attacker from a remote location. Zombies may be active or idle - and owners of the systems generally do not know their systems are compromised.
Master boot record infector
Zombie
impersonation
qualitative analysis
18. The security property that data is not modified in an unauthorized and undetected manner. Also - the principle and measures taken to ensure that data received is in the exact same condition and state as when it was originally transmitted.
public key infrastructure (PKI)
Lightweight Directory Access Protocol (LDAP)
integrity
Man-in-the-middle attack
19. An attacker who breaks into computer systems with malicious intent - without the owner's knowledge or permission.
single loss expectancy (SLE)
Cloning
Black Hat
Authentication - Authorization - and Accounting (AAA)
20. nmap
Worm
Buffer Overflow
phishing
-p <port ranges>
21. Normal scan timing
single loss expectancy (SLE)
R
impersonation
parallel scan
22. A programming principle whereby the last piece of data added to the stack is the first piece of data taken off.
Asset
risk acceptance
pattern matching
Last In First Out (LIFO)
23. A wireless LAN security standard developed by IEEE. Requires Temporal Key Integrity Protocol (TKIP) and Advanced Encryption Standard (AES).
Daisy Chaining
serialize scans & 15 sec wait
802.11 i
Three-Way (TCP) Handshake
24. An Application layer protocol for managing devices on an IP network.
HTTP tunneling
Data Link layer
Simple Network Management Protocol (SNMP)
Decryption
25. A unique numerical string - created by a hashing algorithm on a given piece of data - used to verify data integrity. Generally hashes are used to verify the integrity of files after download (comparison to the hash value on the site before download)
hash
hot site
Information Technology (IT) infrastructure
nslookup
26. A command used in HTTP and FTP to retrieve a file from a server.
Virtual Private Network (VPN)
Simple Network Management Protocol (SNMP)
GET
Access Control List (ACL)
27. An Application layer protocol used by local email clients to retrieve e-mail from a remote server over a TCP/IP connection.
infrastructure mode
Post Office Protocol 3 (POP3)
Decryption
Tini
28. An HTTP command to transmit text to a web server for processing. The opposite of an HTTP GET.
inference attack
POST
Electronic serial number
A S
29. The process of pinging each address within a subnet to map potential targets. Ping sweeps are unreliable and easily detectable - but very fast.
shrink-wrap code attacks
ping sweep
Asynchronous
Demilitarized Zone (DMZ)
30. The default network authentication suite of protocols for Windows NT 4.0
NT LAN Manager (NTLM)
Bastion host
The automated process of proactively identifying vulnerabilities of computing systems present in a network
Telnet
31. The act of secretly listening to the private conversations of others without their consent. This can also be done over telephone lines (wiretapping) - e-mail - instant messaging - and other methods of communication considered private
Simple Mail Transfer Protocol (SMTP)
Virtual Local Area Network (VLAN)
Eavesdropping
Biometrics
32. ACK Scan
-sA
encapsulation
Discretionary Access Control (DAC)
DNS
33. A security objective that ensures a resource can be accessed only by authorized users. This is also the property that sensitive information is not disclosed to unauthorized individuals - entities - or processes.
risk transference
Reconnaissance - Scanning - Gaining Access - Maintaining Access - Covering Tracks
Confidentiality
Acceptable Use Policy (AUP)
34. A string used for authentication in SNMP. The public community string is used for read-only searches - whereas the private community string is used for read/write. Community strings are transmitted in clear text in SNMPv1. SNMPv3 provides encryption
Community String
Tini
-sR
-PT
35. Software or firmware intended to perform an unauthorized process that will have an adverse impact on the confidentiality - integrity - or availability of an information system. A virus - worm - Trojan horse - or other code-based entity that infects a
Malicious code
script kiddie
Banner Grabbing
Auditing
36. Software that has advertisements embedded within. Generally displays ads in the form of pop-ups.
initial sequence number (ISN)
Adware
Information Technology (IT) asset valuation
forwarding
37. A computer placed outside a firewall to provide public services to other Internet sites - and hardened to resist external attacks.
replay attack
Bastion host
operating system attack
Black Hat
38. The conveying of official access or legal power to a person or entity.
halo effect
Defines legal email marketing
Authorization
Timestamping
39. A step-by-step method of solving a problem. In computing security - an algorithm is a set of mathematical rules (logic) for the process of encryption and decryption
Algorithm
risk
Wrapper
Wi-Fi
40. Independent review and examination of records and activities to assess the adequacy of system controls - to ensure compliance with established policies and operational procedures - and to recommend necessary changes.
halo effect
symmetric algorithm
audit
parallel scan & 75 sec timeout & 0.3 sec/probe
41. A type of encryption where the same key is used to encrypt and decrypt the message.
symmetric encryption
inference attack
security controls
Echo Reply
42. A virus designed to infect the master boot record.
Copyright
Internet Protocol Security (IPSec) architecture
ad hoc mode
Master boot record infector
43. Software code - a portion of data - or sequence of commands intended to take advantage of a bug or vulnerability in order to cause unintended or unanticipated behavior to occur on computer software or hardware.
hash
Exploit
pattern matching
Echo Reply
44. An attack with the goal of preventing authorized users from accessing services and preventing the normal operation of computers and networks.
Denial of Service (DoS)
heuristic scanning
footprinting
spyware
45. A computer file system architecture used in Windows - OS/2 - and most memory cards.
Tiger Team
File Allocation Table (FAT)
Bastion host
802.11 i
46. nmap all output
Denial of Service (DoS)
-oA
Administratively Prohibited
Decryption
47. The organization that governs the Internet's top-level domains - IP address allocation - and port number assignments.
Wired Equivalent Privacy (WEP)
Level I assessment
Internet Assigned Number Authority (IANA)
TACACS
48. Layer 6 of the OSI reference model. The Presentation layer ensures information sent by the Application layer of the sending system will be readable by the Application layer of the receiving system.
-oA
public key
replay attack
Presentation layer
49. Formerly Redundant Array of Inexpensive Disks; a technology that provides increased storage functions and reliability through redundancy. This is achieved by combining multiple disk drive components into a logical unit - where data is distributed acr
Redundant Array of Independent Disks (RAID)
-sS
iris scanner
Trojan Horse
50. A set of exclusive rights granted by the law of a jurisdiction to the author or creator of an original work - including the right to copy - distribute - and adapt the work.
Copyright
flood
stateful packet filtering
Directory Traversal