SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Drawing symbols in public places to alert others to an open Wi-Fi network. War chalking can include the SSIDs - administrative passwords to APs - and other information.
network access server
Certificate
War Chalking
shoulder surfing
2. Window Scan
HTTP tunneling
Trusted Computer System Evaluation Criteria (TCSEC)
-sW
Biometrics
3. A class of algorithms for cryptography that use the same cryptographic key for both decryption and encryption.
symmetric algorithm
Audit Data
Web Spider
International Organization for Standardization (ISO)
4. Devices - connected to one or more switches - grouped logically into a single broadcast domain. VLANs enable administrators to divide the devices connected to the switches into multiple VLANs without requiring separate physical switches.
Virtual Local Area Network (VLAN)
network operations center (NOC)
impersonation
Covert Channel
5. Microsoft SID 500
Local Administrator
-p <port ranges>
open source
protocol
6. An attack where the hacker positions himself between the client and the server - to intercept (and sometimes alter) data traveling between the two.
Password Authentication Protocol (PAP)
Level II assessment
-sP
Man-in-the-middle attack
7. A unit of information formatted according to specific protocols that allows precise transmittal of data from one network node to another. Also called a datagram or data packet - a packet contains a header (container) and a payload (contents). Any IP
Bluetooth
Address Resolution Protocol (ARP) table
packet
Open System Interconnection (OSI) Reference Model
8. Directing a protocol from one port to another.
port redirection
Back orifice
hacktivism
fragmentation
9. A device that receives and sends data packets between two or more networks; the packet headers and a forwarding table provide the router with the information necessary for deciding which interface to use to forward packets.
router
rule-based access control
Vulnerability
Copyright
10. Formerly Redundant Array of Inexpensive Disks; a technology that provides increased storage functions and reliability through redundancy. This is achieved by combining multiple disk drive components into a logical unit - where data is distributed acr
integrity
Redundant Array of Independent Disks (RAID)
-PM
Hacks without permission
11. The steps taken to gather evidence and information on the targets you wish to attack.
reconnaissance
Information Technology (IT) infrastructure
firewalking
remote procedure call (RPC)
12. Port 135
route
infrastructure mode
RPC-DCOM
Bug
13. LM Hash for short passwords (under 7)
404EE
International Organization for Standardization (ISO)
Wired Equivalent Privacy (WEP)
security by obscurity
14. Method used by antivirus software to detect new - unknown viruses that have not yet been identified; based on a piece-by-piece examination of a program - looking for a sequence or sequences of instructions that differentiate the virus from 'normal' p
Whois
SID
security controls
heuristic scanning
15. An attack that exploits the common mistake many people make when installing operating systems
Fiber Distributed Data Interface (FDDI)
operating system attack
Data Link layer
Wi-Fi
16. Attacks that take advantage of the built-in code and scripts most off-the-shelf applications come with.
No previous knowledge of the network
Cache
shrink-wrap code attacks
NT LAN Manager (NTLM)
17. A backlog of packets stored in buffers and waiting to be forwarded over an interface.
key exchange protocol
Authentication Header (AH)
queue
Level I assessment
18. A type of attack used to deny service to legitimate users of a network resource by intentionally overloading the network with illegitimate TCP connection requests. SYN packets are sent repeatedly to the target - but the corresponding SYN/ACK response
Cold Site
Level III assessment
R
SYN flood attack
19. A system used by the Securities and Exchange Commission (SEC) for companies and businesses to transmit required filings and information. The EDGAR database performs automated collection - validation - indexing - acceptance - and forwarding of submiss
Certificate
EDGAR database
802.11
Vulnerability Assessment
20. A type of DNS transfer - where all records from an SOA are transmitted to the requestor. Zone transfers have two options: full (opcode AXFR) and incremental (IXFR).
firewalking
Zone transfer
rule-based access control
limitation of liability and remedies
21. Actions - devices - procedures - techniques - or other measures intended to reduce the vulnerability of an information system.
Black Hat
Active Attack
Countermeasures
route
22. A group of penetration testers that assess the security of an organization - which is often unaware of the existence of the team or the exact assignment.
red team
keylogger
service level agreements (SLAs)
Information Technology Security Evaluation Criteria (ITSEC)
23. Software that has advertisements embedded within. Generally displays ads in the form of pop-ups.
flood
802.11 i
Fiber Distributed Data Interface (FDDI)
Adware
24. A device providing temporary - on-demand - point-to-point network access to users.
Wired Equivalent Privacy (WEP)
MAC filtering
Black Box Testing
network access server
25. A value assigned to uniquely identify a single wide area network (WAN) in wireless LANs. SSIDs are broadcast by default - and are sent in the header of every packet. SSIDs provide no encryption or security.
Access Creep
Service Set Identifier (SSID)
Acceptable Use Policy (AUP)
keylogger
26. A piece of code intentionally inserted into a software system that will perform a malicious function when specified conditions are met at some future point.
logic bomb
network tap
National Security Agency
Simple Object Access Protocol (SOAP)
27. A means of restricting access to system resources based on the sensitivity (as represented by a label) of the information contained in the system resource and the formal authorization (that is - clearance) of users to access information of such sensi
penetration testing
security defect
Mandatory access control (MAC)
Dumpster Diving
28. Provides router-to-router or host-to-network connections over asynchronous and synchronous circuits.
Traceroute
spam
Point-to-Point Protocol (PPP)
NetBSD
29. Defined in RFC 826 - ARP is a protocol used to map a known IP address to a physical (MAC) address.
qualitative analysis
Post Office Protocol 3 (POP3)
intrusion detection system (IDS)
Address Resolution Protocol (ARP)
30. Vulnerability Scanning
The automated process of proactively identifying vulnerabilities of computing systems present in a network
Kerberos
Contingency Plan
hot site
31. The act or actions of a hacker to put forward a cause or a political agenda - to affect some societal change - or to shed light on something he feels to be political injustice. These activities are usually illegal in nature.
risk avoidance
parallel scan & 300 sec timeout & 1.25 sec/probe
Port Address Translation (PAT)
hacktivism
32. A method of evaluating the security of a computer system or network by simulating an attack from a malicious source.
routed protocol
penetration testing
rootkit
Community String
33. An enumeration technique used to provide information about a computer system; generally used for operating system identification (also known as fingerprinting).
War Driving
CAM table
Malicious code
Banner Grabbing
34. A social-engineering attack using computer resources - such as e-mail or IRC.
network tap
Computer-Based Attack
polymorphic virus
out-of-band signaling
35. Cracking Tools
John the Ripper - LOphtcrack - Ophtcrack - Cain and Abel
Presentation layer
The automated process of proactively identifying vulnerabilities of computing systems present in a network
Wide Area Network (WAN)
36. Set of tools (applications or code) that enables administrator-level accessto a computer or computer network and is designed to obscure the fact that the system has been compromised. Rootkits are dangerous malware entities that provide administrator
Internal access to the network
serialize scans & 0.4 sec wait
S
rootkit
37. A value used to control cryptographic operations - such as decryption -encryption - signature generation - and signature verification.
Acknowledgment (ACK)
Written Authorization
John the Ripper - LOphtcrack - Ophtcrack - Cain and Abel
Cryptographic Key
38. A type 0 ICMP message used to reply to ECHO requests. Used with ping to verify network layer connectivity between hosts.
CIA triangle
non-repudiation
ECHO reply
XOR Operation
39. Insane scan timing
asynchronous transmission
parallel scan & 75 sec timeout & 0.3 sec/probe
Community String
Cryptography
40. A comparison metric for different biometric devices and technologies; the point at which the false acceptance rate (FAR) equals the
Uniform Resource Locator (URL)
Crossover Error Rate (CER)
Computer Emergency Response Team (CERT)
Point-to-Point Tunneling Protocol (PPTP)
41. Physical socket provided on routers and switches for cable connections between a computer and the router/switch. This connection enables the computer to configure - query - and troubleshoot the router/switch by use of a terminal emulator and a comman
Console Port
Virtual Private Network (VPN)
security controls
packet
42. Any circumstance or event with the potential to adversely impact organizationaloperations - organizational assets - or individuals through an information system via unauthorized access - destruction - disclosure - modification of information - and/or
stream cipher
Internet Assigned Number Authority (IANA)
ECHO reply
Threat
43. Malware designed to install some sort of virus - backdoor - and so on - on a target system.
passive attack
Request for Comments (RFC)
Malicious code
Droppers
44. A hardware device used to log keystrokes covertly. Hardware keystroke loggers are very dangerous due to the fact that they cannot be detected through regular software/anti-malware scanning.
hardware keystroke logger
false rejection rate (FRR)
A R
ISO 17799
45. An Application layer protocol - using TCP - for transporting files across an Internet connection. FTP transmits in clear text.
Kerberos
Presentation layer
File Transfer Protocol (FTP)
ad hoc mode
46. A communications protocol used for browsing the Internet.
Hypertext Transfer Protocol (HTTP)
Active Attack
-b
Smurf attack
47. Malicious code that uses a polymorphic engine to mutate while keeping the original algorithm intact; the code changes itself each time it runs - but the function of the code will not change.
polymorphic virus
U P F
Community String
rogue access point
48. A connection-oriented - layer 4 protocol for transporting data over network segments. TCP is considered reliable because it guarantees delivery and the proper reordering of transmitted packets. This protocol is used for most long-haul traffic on the
null session
fragmentation
Zenmap
Transmission Control Protocol (TCP)
49. Attacks on the actual programming code of an application.
Backdoor
Biometrics
Application-Level Attacks
smart card
50. Originally an extension of PPP - this is a protocol for authentication used within wireless networks. Works with multiple authentication measures.
Finger
SYN attack
Simple Object Access Protocol (SOAP)
Extensible Authentication Protocol (EAP)