SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Ping Scan
symmetric algorithm
personal identification number (PIN)
-sP
Digital Certificate
2. A computer security expert who performs security audits and penetration tests against systems or network segments - with the owner's full knowledge and permission - in an effort to increase security.
Secure Sockets Layer (SSL)
spyware
passive attack
Ethical Hacker
3. A software or hardware defect that often results in system vulnerabilities.
Bug
SAM
hot site
Kerberos
4. Port 161/162
SNMP
heuristic scanning
-sW
-sR
5. A protocol for transporting data packets across a packet switched internetwork (such as the Internet). IP is a routed protocol.
-sA
Anonymizer
self encrypting
Internet Protocol (IP)
6. Defined in RFC 826 - ARP is a protocol used to map a known IP address to a physical (MAC) address.
TACACS
Address Resolution Protocol (ARP)
Covert Channel
Information Technology (IT) infrastructure
7. Port 88
-P0
Kerberos
Asymmetric
War Driving
8. A method of defining what rights and permissions an entity has to a given resource. In networking - Access Control Lists are commonly associated with firewall and router traffic filtering rules.
NOP
Access Control List (ACL)
Antivirus (AV) software
queue
9. In regard to hash algorithms - this occurs when two or more distinct inputs produce the same output.
Adware
Collision
Event
Hierarchical File System (HFS)
10. Layer 7 of the OSI reference model. The Application layer provides services to applications - which allow them access to the network. Protocols such as FTP and SMTP reside here.
Application Layer
queue
Access Control List (ACL)
U P F
11. The act of secretly listening to the private conversations of others without their consent. This can also be done over telephone lines (wiretapping) - e-mail - instant messaging - and other methods of communication considered private
Internet Protocol Security (IPSec) architecture
Eavesdropping
Virtual Private Network (VPN)
INFOSEC Assessment Methodology (IAM)
12. A piece of software - provided by the vendor - intended to update or fix known - discovered problems in a computer program or its supporting data.
hashing algorithm
patch
Tiger Team
parallel scan & 75 sec timeout & 0.3 sec/probe
13. An Application layer protocol used by local email clients to retrieve e-mail from a remote server over a TCP/IP connection.
Cryptography
intrusion detection system (IDS)
Post Office Protocol 3 (POP3)
phishing
14. A partially protected zone on a network - not exposed to the full fury of the Internet - but not fully behind the firewall. This technique is typically used on parts of the network that must remain open to the public (such as a web server) but must a
Bluetooth
non-repudiation
Demilitarized Zone (DMZ)
Smurf attack
15. A means of restricting access to system resources based on the sensitivity (as represented by a label) of the information contained in the system resource and the formal authorization (that is - clearance) of users to access information of such sensi
Finding a directory listing and gaining access to a parent or root file for access to other files
Mandatory access control (MAC)
Unicode
symmetric algorithm
16. Normal scan timing
sniffer
parallel scan
Virtual Private Network (VPN)
Fraud and related activity in connection with computers
17. A security tool designed to protect a system or network against attacks by comparing traffic patterns against a list of both known attack signatures and general characteristics of how attacks may be carried out. Threats are rated and protective measu
Videocipher II Satellite Encryption System
Directory Traversal
-sV
intrusion prevention system (IPS)
18. A device providing temporary - on-demand - point-to-point network access to users.
queue
network access server
Client
Domain Name System (DNS)
19. Phases of an attack
Directory Traversal
A procedure for identifying active hosts on a network.
Reconnaissance - Scanning - Gaining Access - Maintaining Access - Covering Tracks
DNS
20. Recording the time - normally in a log file - when an event happens or when information is created or modified.
Timestamping
Interior Gateway Protocol (IGP)
Trapdoor Function
Asymmetric
21. An Ethernet networking system transmitting data at 100 million bits per second (Mbps) - 10 times the speed of an earlier Ethernet standard. Derived from the Ethernet 802.3 standard - it is also known as 100BaseT.
Fast Ethernet
802.11 i
Computer-Based Attack
Decryption
22. A physical security attack where the attacker sifts through garbage and recycle bins for information that may be useful on current and future attacks
pattern matching
key exchange protocol
public key infrastructure (PKI)
Dumpster Diving
23. Paranoid scan timing
parallel scan & 75 sec timeout & 0.3 sec/probe
honeypot
serial scan & 300 sec wait
Access Control List (ACL)
24. Controls internal to a system designed to resolve vulnerabilities and errors soon after they arise.
Domain Name System (DNS) lookup
War Chalking
Corrective Controls
Warm Site
25. The process of pinging each address within a subnet to map potential targets. Ping sweeps are unreliable and easily detectable - but very fast.
FreeBSD
ping sweep
Institute of Electrical and Electronics Engineers (IEEE)
Mantrap
26. A record showing which user has accessed a given resource and what operations the user performed during a given period.
Three-Way (TCP) Handshake
Assessment
Audit Trail
NT LAN Manager (NTLM)
27. A method of permitting only MAC addresses in a preapproved list network access. Addresses not matching are blocked.
MAC filtering
-sX
Routing Protocol
Network Basic Input/Output System (NetBIOS)
28. Attacks on the actual programming code of an application.
Cookie
Information Technology (IT) security architecture and framework
Active Attack
Application-Level Attacks
29. 18 U.S.C. 1029
Possession of access devices
rule-based access control
Zombie
Asynchronous
30. An Internet Protocol Security (IPSec) header used to verify that the contents of a packet have not been modified while the packet was in transit.
overt channel
Authentication Header (AH)
Archive
Syslog
31. The process of recording activity on a system for monitoring and later review.
R
Auditing
NetBus
packet filtering
32. Content Addressable Memory table. Holds all the MAC-address-to-port mappings on a switch.
SSH
false rejection rate (FRR)
CAM table
Malware
33. Layer 6 of the OSI reference model. The Presentation layer ensures information sent by the Application layer of the sending system will be readable by the Application layer of the receiving system.
Vulnerability Assessment
Presentation layer
Timestamping
parallel scan & 75 sec timeout & 0.3 sec/probe
34. Port 80/81/8080
HTTP
nslookup
public key
Master boot record infector
35. A situation in which an IDS or other sensor triggers on an event as an intrusion attempt - when it was actually legitimate traffic.
qualitative analysis
false negative
flood
FreeBSD
36. A set of rules defined by a system administrator that indicates whether access is allowed or denied to resource objects.
Videocipher II Satellite Encryption System
Decryption
Telnet
rule-based access control
37. An attack that is direct in nature - usually where the attacker injects something into - or otherwise alters - the network or system target.
-sA
quality of service (QoS)
-PM
Active Attack
38. Cracking Tools
Distributed DoS (DDoS)
John the Ripper - LOphtcrack - Ophtcrack - Cain and Abel
End User Licensing Agreement (EULA)
404EE
39. A security protocol used in IEEE 802.11i to replace WEP without the requirement to replace legacy hardware.
Wiretapping
Cryptography
Local Administrator
Temporal Key Integrity Protocol (TKIP)
40. Malware designed to install some sort of virus - backdoor - and so on - on a target system.
Droppers
Threat
Corrective Controls
Packet Internet Groper (ping)
41. A group of experts that handles computer security incidents.
promiscuous mode
firewall
security incident response team (SIRT)
CNAME record
42. The monetary value assigned to an IT asset.
Computer-Based Attack
Information Technology (IT) asset valuation
payload
Tunneling
43. A program designed to execute at a specific time to release malicious code onto the computer system or network.
Digital Certificate
Black Hat
Rijndael
Time Bomb
44. Chronological record of system activities to enable the reconstruction and examination of the sequence of events and changes in an event.
Audit Data
Antivirus (AV) software
Simple Network Management Protocol (SNMP)
serialize scans & 15 sec wait
45. A number assigned during TCP startup sessions that tracks how much information has been moved. This number is used by hackers when hijacking sessions.
Internal access to the network
Point-to-Point Protocol (PPP)
Time To Live (TTL)
initial sequence number (ISN)
46. In penetration testing - enumeration is the act of querying a device or network segment thoroughly and systematically for information.
Wrapper
A
payload
enumeration
47. Hashing algorithm that results in a 128-bit output.
MAC filtering
Media Access Control (MAC)
Collision Domain
MD5
48. Idlescan
-sI
passive attack
Client
routed protocol
49. An organization's threshold for the seven areas of information security responsibility. This level is established based on the objectives for maintaining confidentiality - integrity - and availability of the organization's IT assets and infrastructur
Minimum acceptable level of risk
security bulletins
Post Office Protocol 3 (POP3)
Whois
50. A protocol for exchanging packets over a serial line.
-oA
Finger
Serial Line Internet Protocol (SLIP)
promiscuous mode