SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A point-to-point connection between two endpoints created to exchangedata. Typically a tunnel is either an encrypted connection - or a connection using a protocol in a method for which it was not designed. An encrypted connection forms a point-to-poi
Serial Line Internet Protocol (SLIP)
Tunnel
payload
Buffer Overflow
2. Black box test
Service Set Identifier (SSID)
session hijacking
404EE
No previous knowledge of the network
3. A record showing which user has accessed a given resource and what operations the user performed during a given period.
segment
CNAME record
Audit Trail
node
4. Port 161/162
Wired Equivalent Privacy (WEP)
Corrective Controls
SNMP
Availability
5. A type of DNS transfer - where all records from an SOA are transmitted to the requestor. Zone transfers have two options: full (opcode AXFR) and incremental (IXFR).
suicide hacker
ISO 17799
Zone transfer
Multipartite virus
6. An inspection of a place where a company or individual proposes to work - to gather the necessary information for a design or risk assessment.
red team
security controls
site survey
shoulder surfing
7. A means of exchanging information from one entity to another using a process that does not provide an attacker the opportunity to reorder - delete - insert - or read information.
Tunneling Virus
Open System Interconnection (OSI) Reference Model
firewalking
secure channel
8. A technology where you advertise one IP address externally and data packets are rerouted to the appropriate IP address inside your network by a device providing translation services. In this way - IP addresses of machines on your internal network are
impersonation
Network Address Translation (NAT)
public key
Post Office Protocol 3 (POP3)
9. A self-replicating - self-propagating - self-contained program that uses networking mechanisms to spread itself.
Worm
Asynchronous
Wrapper
DNS
10. Version Detection Scan
Covert Channel
Cookie
fully qualified domain name (FQDN)
-sV
11. The condition of a resource being ready for use and accessible by authorized users.
Availability
personal identification number (PIN)
Vulnerability Scanning
Black Hat
12. An attack in which the hacker can derive information from the ciphertext without actually decoding it. Sensitive information can be considered compromised if an adversary can infer its real value with a high level of confidence.
inference attack
Videocipher II Satellite Encryption System
iris scanner
Authentication - Authorization - and Accounting (AAA)
13. Port 137/138/139
Tunneling
Warm Site
false rejection rate (FRR)
SMB
14. Self-contained network with a limited number of participants who extend limited trust to one another in order to accomplish an agreed-upon goal.
Digital Certificate
SSH
intranet
NetBSD
15. don't ping
Back orifice
-P0
CNAME record
-sL
16. In regard to hash algorithms - this occurs when two or more distinct inputs produce the same output.
Client
Password Authentication Protocol (PAP)
Vulnerability
Collision
17. Network Scanning
A procedure for identifying active hosts on a network.
Cracker
Point-to-Point Tunneling Protocol (PPTP)
risk assessment
18. Polite scan timing
serialize scans & 0.4 sec wait
A S
-PS
-oG
19. A virus written in a macro language and usually embedded in document or spreadsheet files.
Macro virus
Address Resolution Protocol (ARP) table
Simple Network Management Protocol (SNMP)
security controls
20. An Application layer protocol for managing devices on an IP network.
-sU
Simple Network Management Protocol (SNMP)
initial sequence number (ISN)
net use \[target ip]IPC$ '' /user:''
21. A free and popular version of the Unix operating system.
footprinting
Archive
Cryptographic Key
FreeBSD
22. A network traffic management technique designed to allow applications to specify the route a packet will take to a destination - regardless of what the route tables between the two systems say.
Transport Layer Security (TLS)
Digital Signature
source routing
International Organization for Standardization (ISO)
23. A remote control program in which the client runs on a local computer and connects to a remote server on a network. Commands entered locally are executed on the remote system.
audit
Telnet
security breach or security incident
Wi-Fi Protected Access (WPA)
24. The public portion of an asymmetric key pair typically used to encrypt data or verify signatures. Public keys are shared and are used to encrypt messages.
public key
-sI
Vulnerability
router
25. Two or more LANs connected by a high-speed line across a large geographical area.
Domain Name
Fiber Distributed Data Interface (FDDI)
Wide Area Network (WAN)
symmetric encryption
26. A communications path - such as the Internet - authorized for data transmission within a computer system or network.
Covert Channel
overt channel
parallel scan & 300 sec timeout & 1.25 sec/probe
Macro virus
27. An attack that exploits the common mistake many people make when installing operating systems
LDAP
pattern matching
operating system attack
SYN flood attack
28. A configuration of a network card that makes the card pass all traffic it receives to the central processing unit rather than just frames addressed to it
promiscuous mode
Anonymizer
Timestamping
Algorithm
29. A skilled hacker that straddles the line between white hat (hacking only with permission and within guidelines) and black hat (malicious hacking for personal gain). Gray hats sometime perform illegal acts to exploit technology with the intent of achi
NetBSD
-sX
gray hat
Audit Data
30. A symmetric key cryptographic algorithm that transforms a block of information at a time using a cryptographic key. For a block cipher algorithm - the length of the input block is the same as the length of the output block.
SID
proxy server
Block Cipher
Hacks without permission
31. Computer software or hardware that can intercept and log traffic passing over a digital network.
CNAME record
802.11
sniffer
Due Diligence
32. The security property that data is not modified in an unauthorized and undetected manner. Also - the principle and measures taken to ensure that data received is in the exact same condition and state as when it was originally transmitted.
public key
integrity
Wi-Fi Protected Access (WPA)
Vulnerability Management
33. An organization composed of engineers - scientists - and students who issue standards related to electrical - electronic - and computer engineering.
White Box Testing
Institute of Electrical and Electronics Engineers (IEEE)
Access Creep
-sF
34. A non-self-replicating program that appears to have a useful purpose - but in reality has a different - malicious purpose.
intrusion detection system (IDS)
Trojan Horse
firewall
SMB
35. ICMP Type/Code 0-0
Address Resolution Protocol (ARP) table
Archive
ISO 17799
Echo Reply
36. A systematic process for the assessment of security vulnerabilities.
symmetric algorithm
Transport Layer Security (TLS)
Collision Domain
INFOSEC Assessment Methodology (IAM)
37. An evaluation conducted to determine the potential for damage to or loss of an IT asset.
hot site
symmetric encryption
Acceptable Use Policy (AUP)
risk assessment
38. Injecting traffic into the network to identify the operating system of a device.
Active Fingerprinting
Threat
phishing
Audit Data
39. A U.S. Department of Defense (DoD) standard that sets basic requirements for assessing the effectiveness of computer security controls built into a computer system.
Trusted Computer System Evaluation Criteria (TCSEC)
integrity
Third Party
key exchange protocol
40. Hex 14
Macro virus
Bluesnarfing
Multipurpose Internet Mail Extensions (MIME)
A R
41. Security measures - such as a locked door - perimeter fence - or security guard - to prevent or deter physical access to a facility - resource - or information stored on physical media.
physical security
Unicode
remote access
Web Spider
42. The steps taken to gather evidence and information on the targets you wish to attack.
Assessment
reconnaissance
U P F
overt channel
43. A method of evaluating the security of a computer system or network by simulating an attack from a malicious source.
FTP
script kiddie
Service Set Identifier (SSID)
penetration testing
44. A text file stored within a browser by a web server that maintains information about the connection. Cookies are used to store information to maintain a unique but consistent surfing experience - but can also contain authentication parameters. Cookie
Anonymizer
White Box Testing
Cookie
Banner Grabbing
45. An API that provides services related to the OSI model's Session layer - allowing applications on separate computers to communicate over a LAN.
Blowfish
Boot Sector Virus
Internet service provider (ISP)
Network Basic Input/Output System (NetBIOS)
46. A standard for encrypting and authenticating MIME data; used primarily for Internet e-mail.
parallel scan
risk
Secure Multipurpose Mail Extension (S/MIME)
iris scanner
47. PI and PT Ping
-PB
honeynet
Wide Area Network (WAN)
Active Directory (AD)
48. A widely used authentication protocol developed at the MassachusettsInstitute of Technology (MIT). Kerberos authentication uses tickets - Ticket Granting Service - and Key Distribution Center.
-P0
logic bomb
Kerberos
A R
49. A distance-vector routing protocol that employs the hop count as a routing metric. The 'hold down time -' used to define how long a route is held in memory - is 180 seconds. RIP prevents routing loops by implementing a limit on the number of hops all
--randomize_hosts -O OS fingerprinting
Routing Information Protocol (RIP)
Videocipher II Satellite Encryption System
Discretionary Access Control (DAC)
50. A background process found in Unix - Linux - Solaris - and other Unix-based operating systems.
R
Wired Equivalent Privacy (WEP)
CIA triangle
Daemon
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests