SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Whether purposeful or the result of malware or other attack - a backdoor is a hidden capability in a system or program for bypassing normal computer authentication systems.
Virtual Local Area Network (VLAN)
forwarding
identity theft
Backdoor
2. A NAT method in which multiple internal hosts - using private IP addressing - can be mapped through a single public IP address using the session IDs and port numbers. An internal global IP address can support in excess of 65 -000 concurrent TCP and U
Application-Level Attacks
Port Address Translation (PAT)
Biometrics
Event
3. The act of using numerous electronic serial numbers on a cell phone until a valid number is located.
encryption
A
Tumbling
Tini
4. A command that instructs the system processor to do nothing. Many overflow attacks involve stringing several NOP operations together (known as a NOP sled).
Exposure Factor
NOP
Tiger Team
Data Link layer
5. The process of using an application to remotely identify open ports on a system (for example - whether systems allow connections through those ports).
port scanning
pattern matching
gap analysis
risk transference
6. Controlling access to a network by analyzing the headers of incoming and outgoing packets - and letting them pass or discarding them based on rule sets created by a network administrator. A packet filter allows or denies packets based on destination
node
packet filtering
Vulnerability
Domain Name System (DNS) lookup
7. A method for detecting malicious code on a computer where the files are compared to signatures of known viruses stored in a database.
SMB
Replacing numbers in a url to access other files
signature scanning
intrusion prevention system (IPS)
8. A self-replicating - self-propagating - self-contained program that uses networking mechanisms to spread itself.
Worm
routed protocol
role-based access control
-sU
9. Provides data encryption for IEEE 802.11 wireless networks so data can only be decrypted by the intended recipients.
Network Address Translation (NAT)
public key infrastructure (PKI)
separation of duties
Wi-Fi Protected Access (WPA)
10. Originally an extension of PPP - this is a protocol for authentication used within wireless networks. Works with multiple authentication measures.
Database
Zero Subnet
Extensible Authentication Protocol (EAP)
human-based social engineering
11. A proprietary - open - wireless technology used for transferring data from fixed and mobile devices over short distances.
Bluetooth
packet filtering
Level III assessment
Hacks without permission
12. A symmetric - block-cipher data-encryption standard that uses a variablelength key that can range from 32 bits to 448 bits.
nslookup
Last In First Out (LIFO)
A R
Blowfish
13. ACK Scan
-sA
Time Bomb
Access Control List (ACL)
queue
14. Port 161/162
SNMP
Routing Protocol
network operations center (NOC)
Methodology
15. A remote control program in which the client runs on a local computer and connects to a remote server on a network. Commands entered locally are executed on the remote system.
Due Care
Telnet
Mandatory access control (MAC)
DNS
16. A formal set of rules describing data transmission - especially across a network. A protocol determines the type of error checking - the data compression method - how the sending device will indicate completion - how the receiving device will indicat
Wrapper
sniffer
protocol
Asymmetric Algorithm
17. A host designed to collect data on suspicious activity.
honeypot
Cookie
Zenmap
proxy server
18. Baseband LAN specification developed by Xerox Corporation - Intel - and Digital Equipment Corporation. One of the least expensive - most widely deployed networking standards; uses the CSMA/CD method of media access control.
Cookie
NetBus
Ethernet
packet
19. Formerly Redundant Array of Inexpensive Disks; a technology that provides increased storage functions and reliability through redundancy. This is achieved by combining multiple disk drive components into a logical unit - where data is distributed acr
Extensible Authentication Protocol (EAP)
Redundant Array of Independent Disks (RAID)
International Organization for Standardization (ISO)
impersonation
20. A computer network confined to a relatively small area - such as a single building or campus - in which devices connect through high-frequency radio waves using IEEE standard 802.11.
public key infrastructure (PKI)
integrity
Wireless Local Area Network (WLAN)
International Organization for Standardization (ISO)
21. Port 135
Common Internet File System/Server Message Block
RPC-DCOM
Hacks with permission
Warm Site
22. An organization's threshold for the seven areas of information security responsibility. This level is established based on the objectives for maintaining confidentiality - integrity - and availability of the organization's IT assets and infrastructur
Minimum acceptable level of risk
Zero Subnet
CIA triangle
rootkit
23. Another term for firewalking
Domain Name System (DNS)
stream cipher
Baseline
port knocking
24. A fully qualified domain name consists of a host and domain name - including a top-level domain such as .com - .net - .mil - .edu -and so on.
Discretionary Access Control (DAC)
Time Bomb
fully qualified domain name (FQDN)
Target Of Engagement (TOE)
25. A section or subset of the network. Often a router or other routing device provides the end point of the segment.
segment
Warm Site
out-of-band signaling
red team
26. A protocol that uses a private key to encrypt data before transmitting confidential documents over the Internet; widely used on e-commerce - banking - and other sites requiring privacy.
Digital Watermarking
reverse social engineering
Secure Sockets Layer (SSL)
NOP
27. A pen testing method where the attacker knows all information about the internal network. It is designed to simulate an attack by a disgruntled systems administrator - or similar level.
A procedure for identifying active hosts on a network.
White Box Testing
Local Administrator
Bluejacking
28. A method of falsely identifying the source of data packets; often used by hackers to make it difficult to trace where an attack originated.
Secure Sockets Layer (SSL)
Confidentiality
-oX
spoofing
29. Method used by antivirus software to detect new - unknown viruses that have not yet been identified; based on a piece-by-piece examination of a program - looking for a sequence or sequences of instructions that differentiate the virus from 'normal' p
impersonation
heuristic scanning
spoofing
Kerberos
30. A cyber attacker who acts without permission from - and gives prior notice to - the resource owner. Also known as a malicious hacker.
quantitative risk assessment
Application-Level Attacks
Asymmetric Algorithm
Cracker
31. Any kind of connection that allows you to see all traffic passing by. Generally used in reference to a NIDS (network-based IDS) to monitor all traffic.
Internet Control Message Protocol (ICMP)
Filter
Possession of access devices
network tap
32. A series of documents and notes on standards used or proposed for use on the Internet; each is identified by a number.
Acknowledgment (ACK)
symmetric encryption
Request for Comments (RFC)
POP 3
33. A device that receives and sends data packets between two or more networks; the packet headers and a forwarding table provide the router with the information necessary for deciding which interface to use to forward packets.
infrastructure mode
Vulnerability Management
Competitive Intelligence
router
34. A card with a built-in microprocessor and memory used for identification or financial transactions. The card transfers data to and from a central computer when inserted into a reader.
Discretionary Access Control (DAC)
Wrapper
smart card
Replacing numbers in a url to access other files
35. Port 53
shoulder surfing
DNS
key exchange protocol
risk
36. A limit on the amount of time or number of iterations or transmissions in computer and network technology a packet can experience before it will be discarded.
Time To Live (TTL)
Blowfish
Tunneling Virus
Ethical Hacker
37. An Internet Protocol Security (IPSec) header used to verify that the contents of a packet have not been modified while the packet was in transit.
inference attack
Bluetooth
Authentication Header (AH)
Malicious code
38. An Application layer protocol used primarily by Microsoft Windows to provide shared access to printers - files - and serial ports. It also provides an authenticated interprocess communication mechanism.
Common Internet File System/Server Message Block
Time Bomb
Zombie
Point-to-Point Tunneling Protocol (PPTP)
39. don't ping
out-of-band signaling
U P F
SYN attack
-P0
40. An Application layer protocol for managing devices on an IP network.
Collision Domain
Tini
Simple Network Management Protocol (SNMP)
Tumbling
41. A computer virus that infects and spreads in multiple ways.
Multipartite virus
-PM
Distributed DoS (DDoS)
XOR Operation
42. A connectionless - layer 4 transport protocol. UDP is faster than TCP - but offers no reliability. A best effort is made to deliver the data - but no checks and verifications are performed to guarantee delivery. Therefore - UDP is termed a 'connectio
User Datagram Protocol (UDP)
A procedure for identifying active hosts on a network.
scope creep
Network Basic Input/Output System (NetBIOS)
43. Incremental Substitution
Telnet
Replacing numbers in a url to access other files
security bulletins
Interior Gateway Protocol (IGP)
44. An attack that combines a brute-force attack with a dictionary attack.
MAC filtering
false rejection rate (FRR)
hybrid attack
Bit Flipping
45. Establish Null Session
Worm
hacktivism
Replacing numbers in a url to access other files
net use \[target ip]IPC$ '' /user:''
46. The central part of a computer or communications system hardware firmware - and software that implements the basic security procedures for controlling access to system resources.
gateway
security kernel
False Acceptance Rate (FAR)
U P F
47. A mode of operation for a block cipher - with the characteristic that each possible block of plaintext has a defined corresponding ciphertext value - and vice versa
Hypertext Transfer Protocol Secure (HTTPS)
Filter
Electronic Code Book (ECB)
Boot Sector Virus
48. Hex 29
U P F
single loss expectancy (SLE)
parameter tampering
port scanning
49. A type of malware that covertly collects information about a user.
sniffer
spyware
Written Authorization
Point-to-Point Protocol (PPP)
50. nmap
public key
Electronic serial number
-p <port ranges>
MAC filtering
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests