SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Also known as the dot-dot-slash attack. Using directory traversal - the attacker attempts to access restricted directories and execute commands outside intended web server directories by using the URL to redirect to an unintended folder location.
Routing Protocol
infrastructure mode
Directory Traversal
Zenmap
2. A means of restricting access to system resources based on the sensitivity (as represented by a label) of the information contained in the system resource and the formal authorization (that is - clearance) of users to access information of such sensi
Cold Site
Detective Controls
Console Port
Mandatory access control (MAC)
3. A point-to-point connection between two endpoints created to exchangedata. Typically a tunnel is either an encrypted connection - or a connection using a protocol in a method for which it was not designed. An encrypted connection forms a point-to-poi
Tunnel
security controls
Domain Name System (DNS) lookup
hashing algorithm
4. NSA
Internet Protocol (IP)
War Driving
National Security Agency
remote access
5. Process of breaking a packet into smaller units when it is being transmitted over a network medium that's unable to support a transmission unit the original size of the packet.
replay attack
SMB
802.11 i
fragmentation
6. A hacking method for stealing the cookies used during a session build and replaying them for unauthorized connection purposes.
risk transference
packet filtering
sidejacking
Demilitarized Zone (DMZ)
7. A network system of servers that translates numeric Internet Protocol (IP) addresses into human-friendly - hierarchical Internet addresses - and vice versa.
proxy server
Domain Name System (DNS)
S
security breach or security incident
8. Directory Transversal
hybrid attack
Asymmetric
overt channel
Finding a directory listing and gaining access to a parent or root file for access to other files
9. An organized collection of data.
Kerberos
SYN flood attack
Collision
Database
10. A proprietary - open - wireless technology used for transferring data from fixed and mobile devices over short distances.
RPC-DCOM
spoofing
Bug
Bluetooth
11. A device providing temporary - on-demand - point-to-point network access to users.
security defect
network access server
Warm Site
segment
12. A device set up to send a response on behalf of an end node to the requesting host. Proxies are generally used to obfuscate the host from the Internet.
Point-to-Point Protocol (PPP)
End User Licensing Agreement (EULA)
proxy server
session hijacking
13. A software program for remotely controlling a Microsoft Windows computer system over a network. Generally considered malware.
Zombie
enumeration
risk avoidance
NetBus
14. The software product or system that is the subject of an evaluation.
net use \[target ip]IPC$ '' /user:''
quality of service (QoS)
Target Of Engagement (TOE)
Uniform Resource Locator (URL)
15. Establish Null Session
red team
risk avoidance
public key infrastructure (PKI)
net use \[target ip]IPC$ '' /user:''
16. An attack that combines a brute-force attack with a dictionary attack.
Malware
hybrid attack
Cryptography
symmetric algorithm
17. Defined in RFC 826 - ARP is a protocol used to map a known IP address to a physical (MAC) address.
reconnaissance
Address Resolution Protocol (ARP)
piggybacking
Ethical Hacker
18. A term trademarked by the Wi-Fi Alliance - used to define a standard for devices to use to connect to a wireless network.
Wi-Fi
Information Technology (IT) infrastructure
-b
FreeBSD
19. A computer network confined to a relatively small area - such as a single building or campus - in which devices connect through high-frequency radio waves using IEEE standard 802.11.
net use \[target ip]IPC$ '' /user:''
Wireless Local Area Network (WLAN)
Syslog
Directory Traversal
20. A technology where you advertise one IP address externally and data packets are rerouted to the appropriate IP address inside your network by a device providing translation services. In this way - IP addresses of machines on your internal network are
Cookie
Bluetooth
Anonymizer
Network Address Translation (NAT)
21. A background process found in Unix - Linux - Solaris - and other Unix-based operating systems.
Daemon
sniffer
The automated process of proactively identifying vulnerabilities of computing systems present in a network
Confidentiality
22. ICMP Ping
symmetric encryption
self encrypting
suicide hacker
-PI
23. A type of attack used to deny service to legitimate users of a network resource by intentionally overloading the network with illegitimate TCP connection requests. SYN packets are sent repeatedly to the target - but the corresponding SYN/ACK response
Fraud and related activity in connection with computers
SYN flood attack
Due Diligence
serialize scans & 0.4 sec wait
24. The central part of a computer or communications system hardware firmware - and software that implements the basic security procedures for controlling access to system resources.
security kernel
Hypertext Transfer Protocol Secure (HTTPS)
firewall
Auditing
25. A free - open source version of the Berkeley Software Distribution of Unix - often used in embedded systems.
NetBSD
The automated process of proactively identifying vulnerabilities of computing systems present in a network
security bulletins
Third Party
26. ICMP Type/Code 11
Banner Grabbing
-PI
Time exceeded
Real application encompassing Trojan
27. 1. The path a packet travels to reach the intended destination. Each individual device along the path traveled is called a hop. 2. Information contained on a device containing instructions for reaching other nodes on the network. This information can
Covert Channel
route
Simple Network Management Protocol (SNMP)
intrusion detection system (IDS)
28. An application that monitors a computer or network to identify - and prevent - malware. AV is usually signature-based - and can take multiple actions on defined malware files/activity.
Countermeasures
Domain Name System (DNS)
proxy server
Antivirus (AV) software
29. A communications path - such as the Internet - authorized for data transmission within a computer system or network.
Unicode
local area network (LAN)
overt channel
Ethernet
30. A configuration of a network card that makes the card pass all traffic it receives to the central processing unit rather than just frames addressed to it
Directory Traversal
promiscuous mode
sheepdip
Cookie
31. A Windows-based GUI version of nmap.
Zenmap
port redirection
single loss expectancy (SLE)
Administratively Prohibited
32. A network architecture framework developed by ISO that describes the communications process between two systems across the Internet in seven distinct layers.
Demilitarized Zone (DMZ)
Interior Gateway Protocol (IGP)
Open System Interconnection (OSI) Reference Model
SSH
33. A free and popular version of the Unix operating system.
Collision Domain
Trusted Computer Base (TCB)
FreeBSD
Asynchronous
34. Formal description and evaluation of the vulnerabilities in an information system
Third Party
identity theft
Wired Equivalent Privacy (WEP)
Vulnerability Assessment
35. A utility that traces a packet from your computer to an Internet host - showing how many hops the packet takes to reach the host and how long the packet requires to complete the hop.
Traceroute
Malware
Mandatory access control (MAC)
Cracker
36. A protocol that allows a client computer to request services from a server and the server to return the results.
remote procedure call (RPC)
pattern matching
OpenBSD
Lightweight Directory Access Protocol (LDAP)
37. A symmetric key cipher where plaintext bits are combined with a pseudo-random cipher bit stream (keystream) - typically by an exclusive-or (XOR) operation. In a stream cipher the plaintext digits are encrypted one at a time - and the transformation o
-sL
stream cipher
False Acceptance Rate (FAR)
limitation of liability and remedies
38. Software used to bind a Trojan and a legitimate program together so the Trojan will be installed when the legitimate program is executed.
Wrapper
gap analysis
Vulnerability Management
Authentication - Authorization - and Accounting (AAA)
39. Normal scan timing
Point-to-Point Protocol (PPP)
Application Layer
keylogger
parallel scan
40. Any kind of connection that allows you to see all traffic passing by. Generally used in reference to a NIDS (network-based IDS) to monitor all traffic.
Antivirus (AV) software
firewalking
Simple Mail Transfer Protocol (SMTP)
network tap
41. The exploitation of a security vulnerability
security breach or security incident
Real application encompassing Trojan
network operations center (NOC)
Baseline
42. A secret - typically consisting of only decimal digits - that a claimant memorizes and uses to authenticate his identity
-oG
route
SID
personal identification number (PIN)
43. The process of a system providing a fully qualified domain name (FQDN) to a local name server - for resolution to its corresponding IP address.
Internet service provider (ISP)
Access Control List (ACL)
Domain Name System (DNS) lookup
Assessment
44. Idlescan
SSH
Cache
Trusted Computer System Evaluation Criteria (TCSEC)
-sI
45. An informed decision to accept the potential for damage to or loss of an IT asset.
-b
Wiretapping
Timestamping
risk acceptance
46. Provides data encryption for IEEE 802.11 wireless networks so data can only be decrypted by the intended recipients.
Wi-Fi Protected Access (WPA)
SID
queue
Minimum acceptable level of risk
47. A system used by the Securities and Exchange Commission (SEC) for companies and businesses to transmit required filings and information. The EDGAR database performs automated collection - validation - indexing - acceptance - and forwarding of submiss
iris scanner
-sV
Routing Protocol
EDGAR database
48. An encryption standard designed by Joan Daemen and Vincent Rijmen. Chosen by a NIST contest to be the Advanced Encryption Standard (AES).
Digital Signature
Filter
Accountability
Rijndael
49. The condition of a resource being ready for use and accessible by authorized users.
HIDS
Availability
Domain Name System (DNS) lookup
intrusion prevention system (IPS)
50. A well-known and studied phenomenon of human nature - whereby a single trait influences the perception of other traits.
Written Authorization
Cloning
halo effect
Data Link layer