SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A cryptographic attack where bits are manipulated in the ciphertext itself to generate a predictable outcome in the plaintext once it is decrypted.
Domain Name System (DNS) lookup
Tiger Team
Virtual Local Area Network (VLAN)
Bit Flipping
2. A software license agreement; a contract between the 'licensor' and purchaser establishing the right to use the software.
NOP
A procedure for identifying active hosts on a network.
End User Licensing Agreement (EULA)
queue
3. Created by the U.S. Federal Communications Commission to uniquely identify mobile devices; often represented as an 11-digit decimal number or eight-digit hexadecimal number.
shoulder surfing
Anonymizer
Electronic serial number
MD5
4. A method used to prevent IDS detection by dividing the request into multiple parts that are sent in different packets
-sL
session splicing
Simple Object Access Protocol (SOAP)
LDAP
5. A configuration of a network card that makes the card pass all traffic it receives to the central processing unit rather than just frames addressed to it
Timestamping
DNS
inference attack
promiscuous mode
6. A file system used by the Mac OS.
Hierarchical File System (HFS)
halo effect
promiscuous mode
Threat
7. The transmission of digital signals without precise clocking or synchronization.
Interior Gateway Protocol (IGP)
pattern matching
asynchronous transmission
Domain Name System (DNS)
8. 1. The path a packet travels to reach the intended destination. Each individual device along the path traveled is called a hop. 2. Information contained on a device containing instructions for reaching other nodes on the network. This information can
Back orifice
route
Man-in-the-middle attack
symmetric algorithm
9. Activities to determine the extent to which a security control is implemented correctly - operating as intended - and producing the desired outcome with respect to meeting the security requirements for the system.
Daemon
Due Care
Assessment
network operations center (NOC)
10. The steps taken to gather evidence and information on the targets you wish to attack.
risk avoidance
Simple Network Management Protocol (SNMP)
Asymmetric
reconnaissance
11. Access by information systems (or users) communicating from outside the information system security perimeter.
smart card
remote access
RID Resource identifier
Last In First Out (LIFO)
12. A systematic process for the assessment of security vulnerabilities.
Baseline
INFOSEC Assessment Methodology (IAM)
CNAME record
Assessment
13. A virus written in a macro language and usually embedded in document or spreadsheet files.
Macro virus
gap analysis
Telnet
404EE
14. Establish Null Session
serialize scans & 15 sec wait
Certificate
Adware
net use \[target ip]IPC$ '' /user:''
15. A step-by-step method of solving a problem. In computing security - an algorithm is a set of mathematical rules (logic) for the process of encryption and decryption
Zero Subnet
Virus
Algorithm
Man-in-the-middle attack
16. A computer virus that infects and spreads in multiple ways.
Echo request
LDAP
Multipartite virus
Internet service provider (ISP)
17. A protocol for exchanging packets over a serial line.
-b
hot site
Serial Line Internet Protocol (SLIP)
Kerberos
18. The monetary value assigned to an IT asset.
--randomize_hosts -O OS fingerprinting
-oN
Information Technology (IT) asset valuation
remote access
19. Provides router-to-router or host-to-network connections over asynchronous and synchronous circuits.
Audit Trail
Cracker
Interior Gateway Protocol (IGP)
Point-to-Point Protocol (PPP)
20. The rate at which a biometric system will incorrectly identify an unauthorized individual and allow them access (see false negative).
-oX
Backdoor
footprinting
False Acceptance Rate (FAR)
21. Nmap ml output
-oX
Virtual Private Network (VPN)
packet
HTTP
22. A set of rules defined to screen network packets based on source address - destination address - or protocol; these rules determine whether the packet will be forwarded or discarded.
Filter
White Box Testing
Digital Watermarking
Access Creep
23. Host-based IDS. An IDS that resides on the host - protecting against file and folder manipulation and other host-based attacks and actions.
-sA
secure channel
HIDS
Digital Certificate
24. nmap
Hacks with permission
-PB
--randomize_hosts -O OS fingerprinting
parallel scan & 300 sec timeout & 1.25 sec/probe
25. An authentication method on point-to-point links - using a three-way handshake and a mutually agreed-upon key.
Interior Gateway Protocol (IGP)
Challenge Handshake Authentication Protocol (CHAP)
Port Address Translation (PAT)
SYN flood attack
26. Weakness in an information system - system security procedures - internal controls - or implementation that could be exploited or triggered by a threat source.
Self Replicating
DNS
Vulnerability
Hypertext Transfer Protocol Secure (HTTPS)
27. A term representing the responsibility managers and their organizations have to provide information security to ensure the type of control - the cost of control - and the deployment of control are appropriate for the system being managed.
Local Administrator
Lightweight Directory Access Protocol (LDAP)
Due Care
-sI
28. Polite scan timing
serialize scans & 0.4 sec wait
-sS
Wi-Fi
-oG
29. A biometric device that uses pattern-recognition techniques based on images of the irises of an individual's eyes.
-sR
Domain Name System (DNS)
iris scanner
404EE
30. Also known as the dot-dot-slash attack. Using directory traversal - the attacker attempts to access restricted directories and execute commands outside intended web server directories by using the URL to redirect to an unintended folder location.
Network Address Translation (NAT)
honeynet
Directory Traversal
Rijndael
31. Literally - 'not balanced or the same.' In computing - asymmetric refers to a difference in networking speeds upstream to downstream. In cryptography - it's the use of more than one key for encryption/authentication purposes.
Asymmetric
symmetric encryption
Denial of Service (DoS)
enumeration
32. An attack that is direct in nature - usually where the attacker injects something into - or otherwise alters - the network or system target.
War Dialing
Wide Area Network (WAN)
parameter tampering
Active Attack
33. The lack of clocking (imposed time ordering) on a bit stream.
Asynchronous
Multipartite virus
Computer-Based Attack
Temporal Key Integrity Protocol (TKIP)
34. A documented process for a procedure designed to be consistent - repeatable - and accountable.
firewall
remote procedure call (RPC)
session splicing
Methodology
35. A mathematical operation requiring two binary inputs: If the inputs match - the output is a 0 - otherwise it is a 1.
replay attack
Fraud and related activity in connection with computers
XOR Operation
Internet Protocol (IP)
36. The directory service created by Microsoft for use on itsnetworks. Provides a variety of network services using Lightweight Directory Access Protocol (LDAP) - Kerberos-based authentication - and single sign-on for user access to network-based resourc
Active Directory (AD)
Computer Emergency Response Team (CERT)
hash
Contingency Plan
37. A nonroutable IP address range intended for use only within the confines of a single organization - falling within the predefined ranges of 10.0.0.0 - 172.16-31.0.0 - or 192.168.0.0.
private network address
Self Replicating
symmetric algorithm
audit
38. Calculations of two components of risk: R - the magnitude of the potential loss (L) - and the probability - p - that the loss will occur.
single loss expectancy (SLE)
quantitative risk assessment
session hijacking
Crossover Error Rate (CER)
39. A protocol used for sending and receiving log information for nodes on a network.
Eavesdropping
gap analysis
Syslog
impersonation
40. nmap
nslookup
-sP
Post Office Protocol 3 (POP3)
-p <port ranges>
41. An attack where the hacker positions himself between the client and the server - to intercept (and sometimes alter) data traveling between the two.
Man-in-the-middle attack
Common Internet File System/Server Message Block
router
Address Resolution Protocol (ARP) table
42. Method used by antivirus software to detect new - unknown viruses that have not yet been identified; based on a piece-by-piece examination of a program - looking for a sequence or sequences of instructions that differentiate the virus from 'normal' p
-p <port ranges>
heuristic scanning
Hacks without permission
Distributed DoS (DDoS)
43. A defined measure of service within a network system
Man-in-the-middle attack
Administratively Prohibited
segment
quality of service (QoS)
44. White box test
Domain Name System (DNS) lookup
Internal access to the network
Real application encompassing Trojan
Zenmap
45. An attacker who breaks into computer systems with malicious intent - without the owner's knowledge or permission.
LDAP
Decryption
security by obscurity
Black Hat
46. A computer system that performs tasks dictated by an attacker from a remote location. Zombies may be active or idle - and owners of the systems generally do not know their systems are compromised.
HTTP tunneling
Temporal Key Integrity Protocol (TKIP)
Zombie
Replacing numbers in a url to access other files
47. The act of dialing all numbers within an organization to discover open modems.
Media Access Control (MAC)
iris scanner
firewalking
War Dialing
48. Originally an extension of PPP - this is a protocol for authentication used within wireless networks. Works with multiple authentication measures.
hacktivism
Tunneling
Extensible Authentication Protocol (EAP)
intranet
49. An outdated symmetric cipher encryption algorithm - previously U.S. government-approved and used by business and civilian government agencies. DES is no longer considered secure due to the ease with which the entire keyspace can be attempted using mo
phishing
Zombie
hash
Data Encryption Standard (DES)
50. A command used in HTTP and FTP to retrieve a file from a server.
spam
personal identification number (PIN)
router
GET