SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. An electronic version of junk mail. Unsolicited commercial e-mail sent to numerous recipients.
MD5
remote procedure call (RPC)
A procedure for identifying active hosts on a network.
spam
2. A computer security expert who performs security audits and penetration tests against systems or network segments - with the owner's full knowledge and permission - in an effort to increase security.
Ethical Hacker
FreeBSD
Bluejacking
smart card
3. A non-self-replicating program that appears to have a useful purpose - but in reality has a different - malicious purpose.
SSH
Echo Reply
Trojan Horse
-sA
4. A method used to prevent IDS detection by dividing the request into multiple parts that are sent in different packets
Droppers
Sign in Seal
suicide hacker
session splicing
5. Attacks that take advantage of the built-in code and scripts most off-the-shelf applications come with.
-sT
Ethical Hacker
shrink-wrap code attacks
Redundant Array of Independent Disks (RAID)
6. An attacker who breaks into computer systems with malicious intent - without the owner's knowledge or permission.
infrastructure mode
Last In First Out (LIFO)
Simple Mail Transfer Protocol (SMTP)
Black Hat
7. A device on a network.
Electronic serial number
Redundant Array of Independent Disks (RAID)
node
Authentication - Authorization - and Accounting (AAA)
8. Traffic-passing technique used by bridges and switches in which traffic received on an interface is sent out all interfaces on the device except the interface on which the information was originally received. Traffic on a switch is flooded when it is
-PB
enumeration
public key infrastructure (PKI)
flood
9. A list of IP addresses and corresponding MAC addresses stored on a local computer.
Address Resolution Protocol (ARP) table
fully qualified domain name (FQDN)
human-based social engineering
single loss expectancy (SLE)
10. A one-way mathematical function that generates a fixedlength numerical string (hash) from a given data input. MD5 and SHA-1 are hashing algorithms.
service level agreements (SLAs)
smart card
hashing algorithm
-sA
11. A communications channel that is being used for a purpose it was not intended for - usually to transfer information secretly.
Covert Channel
Antivirus (AV) software
Digital Signature
public key
12. An outdated symmetric cipher encryption algorithm - previously U.S. government-approved and used by business and civilian government agencies. DES is no longer considered secure due to the ease with which the entire keyspace can be attempted using mo
qualitative analysis
Data Encryption Standard (DES)
security bulletins
802.11
13. A computer virus that infects and spreads in multiple ways.
Multipartite virus
Domain Name System (DNS)
key exchange protocol
RID Resource identifier
14. A cryptographic attack where bits are manipulated in the ciphertext itself to generate a predictable outcome in the plaintext once it is decrypted.
Demilitarized Zone (DMZ)
Bit Flipping
White Box Testing
encapsulation
15. A technology that establishes a tunnel to create a private - dedicated - leased-line network over the Internet. The data is encrypted so it's readable only by the sender and receiver. Companies commonly use VPNs to allow employees to connect securely
Virtual Private Network (VPN)
Possession of access devices
Zenmap
Ciphertext
16. The change or growth of a project's scope
Zombie
scope creep
Methodology
Possession of access devices
17. A limited-function version of the Internetworking Operating System (IOS) - held in read-only memory in some earlier models of Cisco devices - capable of performing several seldom-needed low-level functions such as loading a new IOS into Flash memory
Hypertext Transfer Protocol Secure (HTTPS)
ping sweep
RxBoot
EDGAR database
18. A device set up to send a response on behalf of an end node to the requesting host. Proxies are generally used to obfuscate the host from the Internet.
Hierarchical File System (HFS)
proxy server
Active Attack
Discretionary Access Control (DAC)
19. A method of defining what rights and permissions an entity has to a given resource. In networking - Access Control Lists are commonly associated with firewall and router traffic filtering rules.
Audit Trail
network interface card (NIC)
shoulder surfing
Access Control List (ACL)
20. Sending unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobile phones - PDAs - or laptop computers.
Hacks without permission
Collision
Zenmap
Bluejacking
21. The conveying of official access or legal power to a person or entity.
Auditing
Authorization
Brute-Force Password Attack
Malicious code
22. A widely used authentication protocol developed at the MassachusettsInstitute of Technology (MIT). Kerberos authentication uses tickets - Ticket Granting Service - and Key Distribution Center.
Accountability
serialize scans & 0.4 sec wait
Kerberos
Zenmap
23. Self-contained network with a limited number of participants who extend limited trust to one another in order to accomplish an agreed-upon goal.
Kerberos
intranet
routed protocol
SSH
24. A protocol for transporting data packets across a packet switched internetwork (such as the Internet). IP is a routed protocol.
Digital Watermarking
Internet Protocol (IP)
operating system attack
Bit Flipping
25. A security protocol used in IEEE 802.11i to replace WEP without the requirement to replace legacy hardware.
-PB
asynchronous transmission
Temporal Key Integrity Protocol (TKIP)
serialize scans & 0.4 sec wait
26. A group of people - gathered together by a business entity - working to address a specific problem or goal.
Transmission Control Protocol (TCP)
Zero Subnet
International Organization for Standardization (ISO)
Tiger Team
27. SYN Ping
Access Creep
Information Technology (IT) infrastructure
-PS
Wireless Local Area Network (WLAN)
28. NSA
National Security Agency
R
File Allocation Table (FAT)
HIDS
29. An attack where the hacker positions himself between the client and the server - to intercept (and sometimes alter) data traveling between the two.
Console Port
CAM table
Man-in-the-middle attack
Fraud and related activity in connection with computers
30. Also known as a digital certificate - this is an electronic file used to verify a user's identity - providing non-repudiation throughout the system It is also a set of data that uniquely identifies an entity. Certificates contain the entity's public
rootkit
Whois
Bastion host
Certificate
31. Formerly Redundant Array of Inexpensive Disks; a technology that provides increased storage functions and reliability through redundancy. This is achieved by combining multiple disk drive components into a logical unit - where data is distributed acr
-sI
ISO 17799
route
Redundant Array of Independent Disks (RAID)
32. A standard that provides best-practice recommendations on information security management for use by those responsible for initiating - implementing - or maintaining Information Security Management Systems (ISMS). Information security is defined with
ISO 17799
Countermeasures
smart card
security bulletins
33. The monetary value assigned to an IT asset.
Information Technology (IT) asset valuation
Blowfish
Digital Watermarking
-sA
34. The steps taken to gather evidence and information on the targets you wish to attack.
NetBus
logic bomb
reconnaissance
Virus Hoax
35. Layer 2 of the OSI reference model. This layer provides reliable transit of data across a physical link. The Data Link layer is concerned with physical addressing - network topology - access to the network medium - error detection - sequential delive
risk avoidance
Data Link layer
promiscuous mode
risk assessment
36. Software used to bind a Trojan and a legitimate program together so the Trojan will be installed when the legitimate program is executed.
Wrapper
Audit Trail
firewall
Serial Line Internet Protocol (SLIP)
37. An Application layer protocol - using TCP - for transporting files across an Internet connection. FTP transmits in clear text.
-PM
packet
Annualized Loss Expectancy (ALE)
File Transfer Protocol (FTP)
38. A utility that traces a packet from your computer to an Internet host - showing how many hops the packet takes to reach the host and how long the packet requires to complete the hop.
Challenge Handshake Authentication Protocol (CHAP)
A R
Traceroute
serialize scans & 15 sec wait
39. Freely and readily available information on an organization that can be gathered by a business entity about its competitor's customers - products - and marketing - and can be used by an attacker to build useful information for further attacks.
POP 3
phishing
Level I assessment
Competitive Intelligence
40. The use of deceptive computer-based means to trick individuals into disclosing sensitive personal information
Application-Level Attacks
phishing
Password Authentication Protocol (PAP)
-sI
41. A type of encryption where the same key is used to encrypt and decrypt the message.
port redirection
Zero Subnet
-PT
symmetric encryption
42. A network traffic management technique designed to allow applications to specify the route a packet will take to a destination - regardless of what the route tables between the two systems say.
source routing
Block Cipher
Simple Object Access Protocol (SOAP)
public key infrastructure (PKI)
43. Normal scan timing
security incident response team (SIRT)
reverse social engineering
Active Attack
parallel scan
44. A Unix-like computer operating system descending from the BSD. Open-BSD includes a number of security features absent or optional in other operating systems.
OpenBSD
Authentication
Secure Sockets Layer (SSL)
ring topology
45. Polite scan timing
RPC-DCOM
human-based social engineering
port redirection
serialize scans & 0.4 sec wait
46. The default network authentication suite of protocols for Windows NT 4.0
Directory Traversal
packet
NT LAN Manager (NTLM)
parameter tampering
47. An HTTP command to transmit text to a web server for processing. The opposite of an HTTP GET.
Routing Protocol
HTTP
Cold Site
POST
48. A biometric device that uses pattern-recognition techniques based on images of the irises of an individual's eyes.
iris scanner
Hacks without permission
reverse lookup; reverse DNS lookup
Event
49. An organization's threshold for the seven areas of information security responsibility. This level is established based on the objectives for maintaining confidentiality - integrity - and availability of the organization's IT assets and infrastructur
-sW
Cracker
Authentication Header (AH)
Minimum acceptable level of risk
50. Directing a protocol from one port to another.
Block Cipher
port redirection
identity theft
Trusted Computer Base (TCB)