SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A one-way mathematical function that generates a fixedlength numerical string (hash) from a given data input. MD5 and SHA-1 are hashing algorithms.
-oG
Assessment
security incident response team (SIRT)
hashing algorithm
2. A group of people - gathered together by a business entity - working to address a specific problem or goal.
personal identification number (PIN)
RID Resource identifier
False Acceptance Rate (FAR)
Tiger Team
3. A portion of memory used to temporarily store output or input data.
Due Care
Destination Unreachable
Buffer
Directory Traversal
4. A set of rules defined by a system administrator that indicates whether access is allowed or denied to resource objects.
local area network (LAN)
rule-based access control
Archive
security bulletins
5. A unique numerical string - created by a hashing algorithm on a given piece of data - used to verify data integrity. Generally hashes are used to verify the integrity of files after download (comparison to the hash value on the site before download)
hash
Brute-Force Password Attack
enumeration
Information Technology (IT) security architecture and framework
6. IP Protocol Scan
-sO
Archive
Tumbling
Bit Flipping
7. A record showing which user has accessed a given resource and what operations the user performed during a given period.
Audit Trail
Telnet
spam
FreeBSD
8. Version Detection Scan
-PM
Denial of Service (DoS)
-sV
-oX
9. An outdated symmetric cipher encryption algorithm - previously U.S. government-approved and used by business and civilian government agencies. DES is no longer considered secure due to the ease with which the entire keyspace can be attempted using mo
Backdoor
Data Encryption Standard (DES)
Administratively Prohibited
Open System Interconnection (OSI) Reference Model
10. An enumeration technique used to provide information about a computer system; generally used for operating system identification (also known as fingerprinting).
-sP
Banner Grabbing
Assessment
rule-based access control
11. A physical security attack where the attacker sifts through garbage and recycle bins for information that may be useful on current and future attacks
Droppers
serialize scans & 15 sec wait
Dumpster Diving
-oA
12. A section or subset of the network. Often a router or other routing device provides the end point of the segment.
Electronic Code Book (ECB)
Information Technology (IT) security architecture and framework
False Acceptance Rate (FAR)
segment
13. Sending unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobile phones - PDAs - or laptop computers.
Serial Line Internet Protocol (SLIP)
Hacks with permission
Bluejacking
-PI
14. Actions - devices - procedures - techniques - or other measures intended to reduce the vulnerability of an information system.
protocol
Directory Traversal
Countermeasures
Bug
15. Wireless LAN standards created by IEEE. 802.11a runs at up to 54Mbps at 5GHz - 802.11b runs at 11Mbps at 2.4GHz - 802.11g runs at 54Mbps at 2.4GHz - and 802.11n can run upwards of 150MBps.
Contingency Plan
802.11
Boot Sector Virus
Tunneling Virus
16. A connection-oriented - layer 4 protocol for transporting data over network segments. TCP is considered reliable because it guarantees delivery and the proper reordering of transmitted packets. This protocol is used for most long-haul traffic on the
human-based social engineering
Transmission Control Protocol (TCP)
Domain Name System (DNS) cache poisoning
network interface card (NIC)
17. A query and response protocol widely used for querying databases that store the registered users or assignees of an Internet resource - such as a domain name - an IP address - or an autonomous system.
Cold Site
Whois
Virtual Private Network (VPN)
Real application encompassing Trojan
18. A condition that occurs when more data is written to a buffer than it has space to store - and results in data corruption or other system errors. This is usually due to insufficient bounds checking - a bug - or improper configuration in the program c
HTTP
stream cipher
hybrid attack
Buffer Overflow
19. In computer security - this is an algorithm that uses separate keys for encryption and decryption.
Detective Controls
Asymmetric Algorithm
War Chalking
Internet Protocol Security (IPSec) architecture
20. A security tool designed to protect a system or network against attacks by comparing traffic patterns against a list of both known attack signatures and general characteristics of how attacks may be carried out. Threats are rated and reported.
FTP
Virtual Local Area Network (VLAN)
intrusion detection system (IDS)
Rijndael
21. A wireless LAN security standard developed by IEEE. Requires Temporal Key Integrity Protocol (TKIP) and Advanced Encryption Standard (AES).
enumeration
802.11 i
Wired Equivalent Privacy (WEP)
Discretionary Access Control (DAC)
22. A limited-function version of the Internetworking Operating System (IOS) - held in read-only memory in some earlier models of Cisco devices - capable of performing several seldom-needed low-level functions such as loading a new IOS into Flash memory
RxBoot
Internet Control Message Protocol (ICMP)
Availability
Media Access Control (MAC)
23. A NAT method in which multiple internal hosts - using private IP addressing - can be mapped through a single public IP address using the session IDs and port numbers. An internal global IP address can support in excess of 65 -000 concurrent TCP and U
Active Attack
security controls
Network Address Translation (NAT)
Port Address Translation (PAT)
24. Layer 7 of the OSI reference model. The Application layer provides services to applications - which allow them access to the network. Protocols such as FTP and SMTP reside here.
Ethernet
Bluejacking
Application Layer
Discretionary Access Control (DAC)
25. A derogatory term used to describe an attacker - usually new to the field - who uses simple - easy-to-follow scripts or programs developed by others to attack computer systems and networks and deface websites.
script kiddie
protocol
Due Care
Digital Signature
26. A protocol used to pass control and error messages between nodes on the Internet.
hybrid attack
Cloning
Internet Control Message Protocol (ICMP)
War Dialing
27. A networking configuration where all nodes are connected in a circle with no terminated ends on the cable.
802.11
Countermeasures
NT LAN Manager (NTLM)
ring topology
28. A protocol that allows a client computer to request services from a server and the server to return the results.
remote procedure call (RPC)
The automated process of proactively identifying vulnerabilities of computing systems present in a network
router
hash
29. A standard for encrypting and authenticating MIME data; used primarily for Internet e-mail.
footprinting
Transport Layer Security (TLS)
-P0
Secure Multipurpose Mail Extension (S/MIME)
30. All measures and techniques taken to gather information about an intended target. Footprinting can be passive or active.
intranet
Banner Grabbing
Fast Ethernet
footprinting
31. A function that is easy to compute in one direction - yet believed to be difficult to compute in the opposite direction (finding its inverse) without special information - called the 'trapdoor.' Widely used in cryptography.
-sS
Electronic Code Book (ECB)
Trapdoor Function
Access Creep
32. Using conversation or some other interaction between people to gather useful information.
POST
-b
human-based social engineering
Wi-Fi
33. A partially protected zone on a network - not exposed to the full fury of the Internet - but not fully behind the firewall. This technique is typically used on parts of the network that must remain open to the public (such as a web server) but must a
Bug
Demilitarized Zone (DMZ)
serial scan & 300 sec wait
Tumbling
34. The central part of a computer or communications system hardware firmware - and software that implements the basic security procedures for controlling access to system resources.
flood
reconnaissance
security kernel
Hierarchical File System (HFS)
35. The process of sending a packet or frame toward the destination. In a switch - messages are forwarded only to the port they are addressed to.
Brute-Force Password Attack
forwarding
security defect
secure channel
36. A social-engineering effort in which the attacker pretends to be an employee - a valid user - or even an executive to elicit information or access.
impersonation
replay attack
Electronic serial number
Exposure Factor
37. An evaluation consisting of a document review - interviews - and demonstrations - as well as vulnerability scans and hands-on testing.
Level II assessment
Due Care
Availability
Syslog
38. A nontechnical method of hacking. Social engineering is the art of manipulating people - whether in person (human-based) or via computing methods (computer-based) - into providing sensitive information.
social engineering
Client
RID Resource identifier
Buffer
39. An attack where the hacker repeats a portion of a cryptographic exchange in hopes of fooling the system into setting up a communications channel.
-p <port ranges>
Antivirus (AV) software
replay attack
Password Authentication Protocol (PAP)
40. ICMP Netmask
-PM
polymorphic virus
Finding a directory listing and gaining access to a parent or root file for access to other files
Client
41. FTP Bounce Attack
initial sequence number (ISN)
-b
Zero Subnet
heuristic scanning
42. Nmap grepable output
Tunnel
-oG
Interior Gateway Protocol (IGP)
stateful packet filtering
43. Traffic-passing technique used by bridges and switches in which traffic received on an interface is sent out all interfaces on the device except the interface on which the information was originally received. Traffic on a switch is flooded when it is
false negative
reverse social engineering
flood
steganography
44. Hex 29
heuristic scanning
Backdoor
U P F
Administratively Prohibited
45. A command used in HTTP and FTP to retrieve a file from a server.
social engineering
Address Resolution Protocol (ARP)
GET
Vulnerability Assessment
46. A symmetric key cryptographic algorithm that transforms a block of information at a time using a cryptographic key. For a block cipher algorithm - the length of the input block is the same as the length of the output block.
promiscuous mode
-PB
Block Cipher
Possession of access devices
47. Set of tools (applications or code) that enables administrator-level accessto a computer or computer network and is designed to obscure the fact that the system has been compromised. Rootkits are dangerous malware entities that provide administrator
fully qualified domain name (FQDN)
rootkit
security controls
operating system attack
48. Black hat
Hacks without permission
Covert Channel
TACACS
SYN flood attack
49. A defined measure of service within a network system
human-based social engineering
Wide Area Network (WAN)
quality of service (QoS)
Due Diligence
50. A type of attack used to deny service to legitimate users of a network resource by intentionally overloading the network with illegitimate TCP connection requests. SYN packets are sent repeatedly to the target - but the corresponding SYN/ACK response
SYN flood attack
Collision Domain
script kiddie
Bluejacking