SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Calculations of two components of risk: R - the magnitude of the potential loss (L) - and the probability - p - that the loss will occur.
quantitative risk assessment
--randomize_hosts -O OS fingerprinting
Open System Interconnection (OSI) Reference Model
Database
2. Nmap ml output
rogue access point
quality of service (QoS)
Overwhelm CAM table to convert switch to hub mode
-oX
3. Freely and readily available information on an organization that can be gathered by a business entity about its competitor's customers - products - and marketing - and can be used by an attacker to build useful information for further attacks.
NetBSD
A R
Competitive Intelligence
Covert Channel
4. FIN Scan
A R
Administratively Prohibited
-sF
Serial Line Internet Protocol (SLIP)
5. A free - open source version of the Berkeley Software Distribution of Unix - often used in embedded systems.
Virus Hoax
-sV
NetBSD
nslookup
6. A set of exclusive rights granted by the law of a jurisdiction to the author or creator of an original work - including the right to copy - distribute - and adapt the work.
Auditing
Information Technology (IT) asset valuation
Copyright
Echo request
7. The combination of all IT assets - resources - components - and systems.
Covert Channel
-b
Biometrics
Information Technology (IT) infrastructure
8. nmap all output
Asset
-oA
Challenge Handshake Authentication Protocol (CHAP)
A
9. A business - government agency - or educational institution that provides access to the Internet.
Internet service provider (ISP)
Cookie
Adware
hybrid attack
10. A condition that occurs when more data is written to a buffer than it has space to store - and results in data corruption or other system errors. This is usually due to insufficient bounds checking - a bug - or improper configuration in the program c
Buffer Overflow
Asymmetric Algorithm
A procedure for identifying active hosts on a network.
Distributed DoS (DDoS)
11. Ping Scan
personal identification number (PIN)
-sP
SYN flood attack
net use \[target ip]IPC$ '' /user:''
12. A hacking method for stealing the cookies used during a session build and replaying them for unauthorized connection purposes.
serial scan & 300 sec wait
ECHO reply
sidejacking
risk acceptance
13. A skilled hacker that straddles the line between white hat (hacking only with permission and within guidelines) and black hat (malicious hacking for personal gain). Gray hats sometime perform illegal acts to exploit technology with the intent of achi
A
Routing Information Protocol (RIP)
gray hat
Zenmap
14. A protocol that uses a private key to encrypt data before transmitting confidential documents over the Internet; widely used on e-commerce - banking - and other sites requiring privacy.
Demilitarized Zone (DMZ)
Service Set Identifier (SSID)
Master boot record infector
Secure Sockets Layer (SSL)
15. In penetration testing - enumeration is the act of querying a device or network segment thoroughly and systematically for information.
Interior Gateway Protocol (IGP)
Common Internet File System/Server Message Block
enumeration
A procedure for identifying active hosts on a network.
16. A cyber attacker who acts without permission from - and gives prior notice to - the resource owner. Also known as a malicious hacker.
phishing
firewall
Internal access to the network
Cracker
17. An organized collection of data.
TACACS
Finding a directory listing and gaining access to a parent or root file for access to other files
Internet service provider (ISP)
Database
18. A device that receives and sends data packets between two or more networks; the packet headers and a forwarding table provide the router with the information necessary for deciding which interface to use to forward packets.
router
Internal access to the network
Videocipher II Satellite Encryption System
Web Spider
19. A text file stored within a browser by a web server that maintains information about the connection. Cookies are used to store information to maintain a unique but consistent surfing experience - but can also contain authentication parameters. Cookie
hash
Cookie
404EE
Virtual Local Area Network (VLAN)
20. Phases of an attack
-oX
Reconnaissance - Scanning - Gaining Access - Maintaining Access - Covering Tracks
ECHO reply
hot site
21. An informed decision to accept the potential for damage to or loss of an IT asset.
DNS enumeration
Domain Name
Virus Hoax
risk acceptance
22. A security protocol for wireless local area networks defined in the 802.11b standard; intended to provide the same level of security as a wired LAN. WEP is not considered strong security - although it does authenticate clients to access points - encr
Wired Equivalent Privacy (WEP)
phishing
LDAP
-PB
23. ICMP Timestamp
Google hacking
queue
spoofing
-PP
24. A virus written in a macro language and usually embedded in document or spreadsheet files.
Internet Assigned Number Authority (IANA)
flood
Macro virus
Community String
25. A denial-of-service attack where the attacker sends a ping to the network's broadcast address from the spoofed IP address of the target. All systems in the subnet then respond to the spoofed address - eventually flooding the device.
Smurf attack
Access Control List (ACL)
Macro virus
hot site
26. In computer security - this is an algorithm that uses separate keys for encryption and decryption.
Smurf attack
Asymmetric Algorithm
fully qualified domain name (FQDN)
Zombie
27. Software or firmware intended to perform an unauthorized process that will have an adverse impact on the confidentiality - integrity - or availability of an information system. A virus - worm - Trojan horse - or other code-based entity that infects a
intrusion prevention system (IPS)
pattern matching
gray box testing
Malicious code
28. Also known as a public key certificate - this is an electronic file that is used to verify a user's identity - providing non-repudiation throughout the sys-tem. Certificates contain the entity's public key - serial number - version - subject - algori
segment
Digital Certificate
Port Address Translation (PAT)
signature scanning
29. FTP Bounce Attack
role-based access control
reverse lookup; reverse DNS lookup
-b
The automated process of proactively identifying vulnerabilities of computing systems present in a network
30. A cryptographic attack where bits are manipulated in the ciphertext itself to generate a predictable outcome in the plaintext once it is decrypted.
Competitive Intelligence
social engineering
Ethical Hacker
Bit Flipping
31. A set of hardware - software - people - policies - and procedures needed to create - manage - distribute - use - store - and revoke digital certificates.
public key infrastructure (PKI)
Boot Sector Virus
Internet Protocol Security (IPSec) architecture
Information Technology Security Evaluation Criteria (ITSEC)
32. An attack that exploits the common mistake many people make when installing operating systems
hacktivism
operating system attack
Audit Data
Availability
33. A method of falsely identifying the source of data packets; often used by hackers to make it difficult to trace where an attack originated.
-oX
Tunnel
Collision Domain
spoofing
34. Monitoring of telephone or Internet conversations - typically by covert means.
hybrid attack
non-repudiation
NetBSD
Wiretapping
35. A measurable - physical characteristic used to recognize the identity - or verify the claimed identity - of an applicant. Facial images - fingerprints - and handwriting samples are all examples of biometrics.
Biometrics
SYN flood attack
Written Authorization
Echo request
36. Insane scan timing
honeypot
integrity
parallel scan & 75 sec timeout & 0.3 sec/probe
halo effect
37. A computer file system architecture used in Windows - OS/2 - and most memory cards.
File Allocation Table (FAT)
routed protocol
honeypot
-b
38. A means of exchanging information from one entity to another using a process that does not provide an attacker the opportunity to reorder - delete - insert - or read information.
Cache
secure channel
intrusion detection system (IDS)
Access Creep
39. The conveying of official access or legal power to a person or entity.
Malware
Hypertext Transfer Protocol (HTTP)
Authorization
Ethical Hacker
40. Polymorphic Virus
Hierarchical File System (HFS)
self encrypting
Overwhelm CAM table to convert switch to hub mode
404EE
41. A program designed to browse websites in an automated - methodical manner. Sometimes these programs are used to harvest information from websites - such as e-mail addresses.
Exposure Factor
Web Spider
-sL
integrity
42. TCP Ping
Domain Name System (DNS) cache poisoning
sniffer
footprinting
-PT
43. In a classful IPv4 subnet - this is the network number with all binary 0s in the subnet part of the number. When written in decimal - the zero subnet has the same number as the classful network number.
Zero Subnet
Domain Name
Internet Protocol (IP)
Trojan Horse
44. A wireless networking mode where all clients connect to the wireless network through a central access point.
pattern matching
Common Internet File System/Server Message Block
infrastructure mode
reconnaissance
45. ICMP Ping
Due Care
Time Bomb
Malware
-PI
46. In penetration testing - this is a method of testing the security of a system or subnet without any previous knowledge of the device or network. Designed to simulate an attack by an outside intruder (usually from the Internet).
stateful packet filtering
fragmentation
Authentication Header (AH)
Black Box Testing
47. A method of network traffic filtering that monitors the entire communications process - including the originator of the session and from which direction it started.
Access Creep
security kernel
stateful packet filtering
Replacing numbers in a url to access other files
48. A set of rules defined to screen network packets based on source address - destination address - or protocol; these rules determine whether the packet will be forwarded or discarded.
Filter
Routing Information Protocol (RIP)
Administratively Prohibited
Wi-Fi Protected Access (WPA)
49. An early network application that provides information on users currently logged on to a machine.
signature scanning
SAM
Finger
phishing
50. Malicious code that uses a polymorphic engine to mutate while keeping the original algorithm intact; the code changes itself each time it runs - but the function of the code will not change.
keylogger
Certificate Authority (CA)
reconnaissance
polymorphic virus