SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A list of IP addresses and corresponding MAC addresses stored on a local computer.
Block Cipher
Address Resolution Protocol (ARP) table
Active Directory (AD)
key exchange protocol
2. Malicious code that uses a polymorphic engine to mutate while keeping the original algorithm intact; the code changes itself each time it runs - but the function of the code will not change.
Wiretapping
polymorphic virus
NetBus
Auditing
3. Any item of value or worth to an organization - whether physical or virtual.
Virus
Asset
GET
polymorphic virus
4. The concept of having more than one person required to complete a task
separation of duties
Overwhelm CAM table to convert switch to hub mode
TACACS
SID
5. A unit of information formatted according to specific protocols that allows precise transmittal of data from one network node to another. Also called a datagram or data packet - a packet contains a header (container) and a payload (contents). Any IP
packet
Access Point (AP)
Tiger Team
network operations center (NOC)
6. A set of rules defined to screen network packets based on source address - destination address - or protocol; these rules determine whether the packet will be forwarded or discarded.
DNS
Secure Sockets Layer (SSL)
S
Filter
7. A standard developed to enable routers to exchange messages containing information about routes to reach subnets in the network.
Time exceeded
Request for Comments (RFC)
keylogger
Routing Protocol
8. An agreement between the penetration tester and the client detailing the activities the tester is permitted to perform.
-P0
site survey
-sR
Written Authorization
9. A point-to-point connection between two endpoints created to exchangedata. Typically a tunnel is either an encrypted connection - or a connection using a protocol in a method for which it was not designed. An encrypted connection forms a point-to-poi
Tunneling
security incident response team (SIRT)
Traceroute
Tunnel
10. A protocol used to pass control and error messages between nodes on the Internet.
Bastion host
inference attack
packet
Internet Control Message Protocol (ICMP)
11. A backup facility with the electrical and physical components of a computer facility - but with no computer equipment in place. The site is ready to receive the necessary replacement computer equipment in the event the user has to move from his main
Data Link layer
Domain Name System (DNS)
Cold Site
Distributed DoS (DDoS)
12. An attack against an authentication protocol in which the attacker intercepts data in transit along the network between the claimant and verifier - but does not alter the data (in other words - eavesdropping).
Archive
passive attack
Anonymizer
Wide Area Network (WAN)
13. The level of importance assigned to an IT asset
Information Technology (IT) asset criticality
physical security
Telnet
SID
14. A group of experts that handles computer security incidents.
Telnet
Eavesdropping
Vulnerability Assessment
security incident response team (SIRT)
15. A computer system that performs tasks dictated by an attacker from a remote location. Zombies may be active or idle - and owners of the systems generally do not know their systems are compromised.
gray hat
Zombie
Computer Emergency Response Team (CERT)
Contingency Plan
16. Port 22
private network address
SSH
Fraud and related activity in connection with computers
network access server
17. An information assurance strategy in which multiple layers of defense are placed throughout an Information Technology system.
Master boot record infector
Contingency Plan
session hijacking
Defense in Depth
18. A nonroutable IP address range intended for use only within the confines of a single organization - falling within the predefined ranges of 10.0.0.0 - 172.16-31.0.0 - or 192.168.0.0.
Timestamping
private network address
serialize scans & 0.4 sec wait
War Chalking
19. A hybrid of the HTTP and SSL/TLS protocols that provides encrypted communication and secure identification of a web server.
Google hacking
Hypertext Transfer Protocol Secure (HTTPS)
Internet Assigned Number Authority (IANA)
service level agreements (SLAs)
20. An attacker who breaks into computer systems with malicious intent - without the owner's knowledge or permission.
SAM
CNAME record
Echo request
Black Hat
21. A protocol for transporting data packets across a packet switched internetwork (such as the Internet). IP is a routed protocol.
Client
Internet Protocol (IP)
Reconnaissance - Scanning - Gaining Access - Maintaining Access - Covering Tracks
Tini
22. Insane scan timing
Adware
Request for Comments (RFC)
symmetric encryption
parallel scan & 75 sec timeout & 0.3 sec/probe
23. A technology that establishes a tunnel to create a private - dedicated - leased-line network over the Internet. The data is encrypted so it's readable only by the sender and receiver. Companies commonly use VPNs to allow employees to connect securely
Target Of Engagement (TOE)
Virtual Private Network (VPN)
Vulnerability
Hypertext Transfer Protocol Secure (HTTPS)
24. Cracking Tools
hybrid attack
Mandatory access control (MAC)
John the Ripper - LOphtcrack - Ophtcrack - Cain and Abel
Time exceeded
25. A set of related communications protocols operating together as a group to address communication at some or all of the seven layers of the OSI reference model.
Droppers
Annualized Loss Expectancy (ALE)
encapsulation
protocol stack
26. The steps taken to gather evidence and information on the targets you wish to attack.
Collision Domain
Sign in Seal
Cold Site
reconnaissance
27. A documented process for a procedure designed to be consistent - repeatable - and accountable.
Methodology
Audit Data
-sA
shoulder surfing
28. 1. The path a packet travels to reach the intended destination. Each individual device along the path traveled is called a hop. 2. Information contained on a device containing instructions for reaching other nodes on the network. This information can
-sP
Macro virus
route
parameter tampering
29. A set of hardware - software - people - policies - and procedures needed to create - manage - distribute - use - store - and revoke digital certificates.
public key infrastructure (PKI)
LDAP
routed protocol
network tap
30. Provides router-to-router or host-to-network connections over asynchronous and synchronous circuits.
Hacks without permission
Post Office Protocol 3 (POP3)
shrink-wrap code attacks
Point-to-Point Protocol (PPP)
31. White hat
Annualized Loss Expectancy (ALE)
Black Box Testing
Collision
Hacks with permission
32. The act of searching for Wi-Fi wireless networks by a person in a moving vehicle - using a portable device.
War Driving
-b
NT LAN Manager (NTLM)
Cache
33. Directory Transversal
Rijndael
hybrid attack
Audit Data
Finding a directory listing and gaining access to a parent or root file for access to other files
34. ICMP Netmask
Transmission Control Protocol (TCP)
Defines legal email marketing
User Datagram Protocol (UDP)
-PM
35. RPC Scan
Digital Certificate
Information Technology (IT) infrastructure
-sR
Electronic Code Book (ECB)
36. A decision to reduce the potential for damage to or loss of an IT asset by taking some type of action
Multipurpose Internet Mail Extensions (MIME)
Tunnel
risk avoidance
Sign in Seal
37. A network system of servers that translates numeric Internet Protocol (IP) addresses into human-friendly - hierarchical Internet addresses - and vice versa.
-sF
security defect
Domain Name System (DNS)
Hacks without permission
38. The rate at which a biometric system will incorrectly reject an access attempt by an authorized user.
Adware
symmetric encryption
Baseline
false rejection rate (FRR)
39. A utility that traces a packet from your computer to an Internet host - showing how many hops the packet takes to reach the host and how long the packet requires to complete the hop.
parallel scan
Password Authentication Protocol (PAP)
Ethical Hacker
Traceroute
40. The condition of a resource being ready for use and accessible by authorized users.
Availability
Trapdoor Function
Cloning
-oA
41. A software or hardware application or device that captures user keystrokes.
Routing Information Protocol (RIP)
keylogger
honeypot
Network Basic Input/Output System (NetBIOS)
42. A small space having two sets of interlocking doors; the first set of doors must close before the second set opens. Typically authentication is required for each door - often using different factors. For example - a smart card may open the first door
Authorization
Presentation layer
Transport Layer Security (TLS)
Mantrap
43. Unauthorized access to information such as a calendar - contact list - e-mails - and text messages on a wireless device through a Bluetooth connection.
Post Office Protocol 3 (POP3)
Bluesnarfing
risk acceptance
Zero Subnet
44. An e-mail message warning users of a nonexistent virus and encouraging them to pass on the message to other users.
asynchronous transmission
Virus Hoax
Antivirus (AV) software
Address Resolution Protocol (ARP)
45. The process of determining if a network entity (user or service) is legitimate
Authentication
Cloning
Address Resolution Protocol (ARP) table
Audit Trail
46. The secret portion of an asymmetric key pair typically used to decrypt or digitally sign data. The private key is never shared and is always used for decryption - with one notable exception: The private key is used to encrypt the digital signature.
Annualized Loss Expectancy (ALE)
private key
site survey
Daisy Chaining
47. An attack with the goal of preventing authorized users from accessing services and preventing the normal operation of computers and networks.
Challenge Handshake Authentication Protocol (CHAP)
Denial of Service (DoS)
private network address
null session
48. A small Trojan program that listens on port 777.
Due Diligence
Hacks without permission
Tini
Denial of Service (DoS)
49. A connection-oriented - layer 4 protocol for transporting data over network segments. TCP is considered reliable because it guarantees delivery and the proper reordering of transmitted packets. This protocol is used for most long-haul traffic on the
hot site
The automated process of proactively identifying vulnerabilities of computing systems present in a network
Transmission Control Protocol (TCP)
Traceroute
50. A computer network confined to a relatively small area - such as a single building or campus - in which devices connect through high-frequency radio waves using IEEE standard 802.11.
Wireless Local Area Network (WLAN)
Bluesnarfing
-sI
Rijndael
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests