SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Phases of an attack
Computer Emergency Response Team (CERT)
Reconnaissance - Scanning - Gaining Access - Maintaining Access - Covering Tracks
Assessment
Access Point (AP)
2. A record showing which user has accessed a given resource and what operations the user performed during a given period.
Covert Channel
GET
The automated process of proactively identifying vulnerabilities of computing systems present in a network
Audit Trail
3. MAC Flooding
nslookup
packet
Overwhelm CAM table to convert switch to hub mode
rogue access point
4. Software or firmware intended to perform an unauthorized process that will have an adverse impact on the confidentiality - integrity - or availability of an information system. A virus - worm - Trojan horse - or other code-based entity that infects a
Malicious code
fully qualified domain name (FQDN)
halo effect
Asset
5. A backup facility with the electrical and physical components of a computer facility - but with no computer equipment in place. The site is ready to receive the necessary replacement computer equipment in the event the user has to move from his main
role-based access control
proxy server
Cold Site
Fast Ethernet
6. A decision to reduce the potential for damage to or loss of an IT asset by taking some type of action
private key
MD5
risk avoidance
Simple Object Access Protocol (SOAP)
7. ACK Scan
White Box Testing
-sA
Trusted Computer Base (TCB)
802.11 i
8. A firewall evasion technique whereby packets are wrapped in HTTP - as a covert channel to the target.
HTTP tunneling
proxy server
packet filtering
Timestamping
9. NSA
serialize scans & 0.4 sec wait
Authentication
spam
National Security Agency
10. Also known as the dot-dot-slash attack. Using directory traversal - the attacker attempts to access restricted directories and execute commands outside intended web server directories by using the URL to redirect to an unintended folder location.
Cryptography
Directory Traversal
Availability
open source
11. An Internet Protocol Security (IPSec) header used to verify that the contents of a packet have not been modified while the packet was in transit.
Authentication Header (AH)
Daisy Chaining
SID
Routing Protocol
12. An encryption standard designed by Joan Daemen and Vincent Rijmen. Chosen by a NIST contest to be the Advanced Encryption Standard (AES).
Rijndael
ECHO reply
Transport Layer Security (TLS)
Annualized Loss Expectancy (ALE)
13. Another term for firewalking
EDGAR database
gray hat
port knocking
ring topology
14. A biometric device that uses pattern-recognition techniques based on images of the irises of an individual's eyes.
iris scanner
Lightweight Directory Access Protocol (LDAP)
net use \[target ip]IPC$ '' /user:''
Brute-Force Password Attack
15. A self-replicating - self-propagating - self-contained program that uses networking mechanisms to spread itself.
RPC-DCOM
Wi-Fi
Worm
Defense in Depth
16. The rate at which a biometric system will incorrectly reject an access attempt by an authorized user.
site survey
false rejection rate (FRR)
security incident response team (SIRT)
footprinting
17. When an authorized person allows (intentionally or unintentionally) someone to pass through a secure door - despite the fact that the intruder does not have a badge.
Authentication - Authorization - and Accounting (AAA)
piggybacking
Computer-Based Attack
Daemon
18. A piece of software - provided by the vendor - intended to update or fix known - discovered problems in a computer program or its supporting data.
Fraud and related activity in connection with computers
patch
Third Party
Media Access Control (MAC)
19. A routing protocol developed to be used within a single organization.
Tiger Team
null session
Interior Gateway Protocol (IGP)
File Transfer Protocol (FTP)
20. An e-mail message warning users of a nonexistent virus and encouraging them to pass on the message to other users.
Virus Hoax
packet filtering
-sX
Authentication Header (AH)
21. An attack against an authentication protocol in which the attacker intercepts data in transit along the network between the claimant and verifier - but does not alter the data (in other words - eavesdropping).
signature scanning
Administratively Prohibited
passive attack
Network Address Translation (NAT)
22. A means of restricting access to system resources based on the sensitivity (as represented by a label) of the information contained in the system resource and the formal authorization (that is - clearance) of users to access information of such sensi
Time To Live (TTL)
script kiddie
Internet Assigned Number Authority (IANA)
Mandatory access control (MAC)
23. The process of using an application to remotely identify open ports on a system (for example - whether systems allow connections through those ports).
node
Cryptography
port scanning
Bit Flipping
24. ICMP Timestamp
signature scanning
iris scanner
CIA triangle
-PP
25. Ping Scan
-sP
Time Bomb
POP 3
keylogger
26. A card with a built-in microprocessor and memory used for identification or financial transactions. The card transfers data to and from a central computer when inserted into a reader.
smart card
Presentation layer
No previous knowledge of the network
Three-Way (TCP) Handshake
27. Layer 6 of the OSI reference model. The Presentation layer ensures information sent by the Application layer of the sending system will be readable by the Application layer of the receiving system.
Presentation layer
scope creep
replay attack
network operations center (NOC)
28. Xmas Tree scan
Information Technology (IT) asset valuation
security incident response team (SIRT)
Rijndael
-sX
29. nmap
Data Link layer
Minimum acceptable level of risk
-p <port ranges>
routed protocol
30. A security tool designed to protect a system or network against attacks by comparing traffic patterns against a list of both known attack signatures and general characteristics of how attacks may be carried out. Threats are rated and protective measu
Malicious code
Hierarchical File System (HFS)
Cloning
intrusion prevention system (IPS)
31. The process of attaching a particular protocol header and trailer to a unit of data before transmission on the network. Occurs at layer 2 of the OSI reference model.
Simple Object Access Protocol (SOAP)
encapsulation
Syslog
rootkit
32. The use of deceptive computer-based means to trick individuals into disclosing sensitive personal information
node
phishing
Minimum acceptable level of risk
Authentication Header (AH)
33. Microsoft SID 500
Copyright
Local Administrator
shrink-wrap code attacks
Open System Interconnection (OSI) Reference Model
34. A technology where you advertise one IP address externally and data packets are rerouted to the appropriate IP address inside your network by a device providing translation services. In this way - IP addresses of machines on your internal network are
Worm
Destination Unreachable
Cryptographic Key
Network Address Translation (NAT)
35. Terminal Access Controller Access-Control System. A remote authentication protocol that is used to communicate with an authentication server commonly used in Unix networks.
TACACS
net use \[target ip]IPC$ '' /user:''
Black Box Testing
Virus Hoax
36. Sending unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobile phones - PDAs - or laptop computers.
Digital Signature
The automated process of proactively identifying vulnerabilities of computing systems present in a network
net use \[target ip]IPC$ '' /user:''
Bluejacking
37. A set of rules defined by a system administrator that indicates whether access is allowed or denied to resource objects.
hashing algorithm
Sign in Seal
rule-based access control
Methodology
38. White box test
Simple Object Access Protocol (SOAP)
Audit Trail
War Driving
Internal access to the network
39. An evaluation conducted to determine the potential for damage to or loss of an IT asset.
self encrypting
null session
Zero Subnet
risk assessment
40. An information assurance strategy in which multiple layers of defense are placed throughout an Information Technology system.
Routing Information Protocol (RIP)
Defense in Depth
Fiber Distributed Data Interface (FDDI)
Post Office Protocol 3 (POP3)
41. FTP Bounce Attack
-b
Telnet
gray box testing
Collision
42. Aggressive scan timing
route
Malware
risk
parallel scan & 300 sec timeout & 1.25 sec/probe
43. Version Detection Scan
Methodology
Multipartite virus
Detective Controls
-sV
44. An electronic version of junk mail. Unsolicited commercial e-mail sent to numerous recipients.
Whois
packet filtering
spam
Vulnerability
45. A set of related communications protocols operating together as a group to address communication at some or all of the seven layers of the OSI reference model.
Ciphertext
Defines legal email marketing
Blowfish
protocol stack
46. Controls to detect anomalies or undesirable events occurring on a system.
Possession of access devices
Detective Controls
Ethernet
site survey
47. A documented process for a procedure designed to be consistent - repeatable - and accountable.
Network Basic Input/Output System (NetBIOS)
A S
Methodology
secure channel
48. A network deployed as a trap to detect - deflect - or deter unauthorized use of information systems.
hardware keystroke logger
ring topology
honeynet
Tunnel
49. The art and science of creating a covert message or image within another message - image - audio - or video file.
Virus
steganography
XOR Operation
logic bomb
50. The default network authentication suite of protocols for Windows NT 4.0
NT LAN Manager (NTLM)
Post Office Protocol 3 (POP3)
Active Attack
Warm Site