SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A skilled hacker that straddles the line between white hat (hacking only with permission and within guidelines) and black hat (malicious hacking for personal gain). Gray hats sometime perform illegal acts to exploit technology with the intent of achi
SYN flood attack
Authentication - Authorization - and Accounting (AAA)
gray hat
remote access
2. A defined measure of service within a network system
Vulnerability Management
quality of service (QoS)
queue
route
3. A trusted entity that issues and revokes public key certificates. In a network - a CA is a trusted entity that issues - manages - and revokes security credentials and public keys for message encryption and/or authentication. Within a public key infra
Certificate Authority (CA)
spam
Active Directory (AD)
SAM
4. A protocol for transporting data packets across a packet switched internetwork (such as the Internet). IP is a routed protocol.
Internet Protocol (IP)
Port Address Translation (PAT)
gap analysis
symmetric encryption
5. Text or data in its encrypted form; the result of plaintext being input into a cryptographic algorithm.
Ciphertext
gap analysis
Authentication - Authorization - and Accounting (AAA)
Reconnaissance - Scanning - Gaining Access - Maintaining Access - Covering Tracks
6. ICMP Timestamp
Wi-Fi
gray hat
Institute of Electrical and Electronics Engineers (IEEE)
-PP
7. The cyclical practice of identifying - classifying - remediating - and mitigating vulnerabilities.
Vulnerability Management
End User Licensing Agreement (EULA)
infrastructure mode
Virtual Private Network (VPN)
8. A programming principle whereby the last piece of data added to the stack is the first piece of data taken off.
-oN
Last In First Out (LIFO)
Information Technology (IT) asset valuation
public key
9. UDP Scan
smart card
War Chalking
-sU
National Security Agency
10. The steps taken to gather evidence and information on the targets you wish to attack.
Common Internet File System/Server Message Block
-PP
reconnaissance
Community String
11. Conversion of plaintext to ciphertext through the use of a cryptographic algorithm.
SSH
Countermeasures
Bit Flipping
encryption
12. The public portion of an asymmetric key pair typically used to encrypt data or verify signatures. Public keys are shared and are used to encrypt messages.
-sU
Internet service provider (ISP)
Fraud and related activity in connection with computers
public key
13. The Security Accounts Manager file in Windows stores all the password hashes for the system.
Database
key exchange protocol
Information Technology (IT) infrastructure
SAM
14. An attack where the hacker positions himself between the client and the server - to intercept (and sometimes alter) data traveling between the two.
piggybacking
integrity
Man-in-the-middle attack
Daemon
15. An attack that combines a brute-force attack with a dictionary attack.
Internet Assigned Number Authority (IANA)
hybrid attack
Sign in Seal
overt channel
16. The potential for damage to or loss of an IT asset
initial sequence number (ISN)
risk
Corrective Controls
Third Party
17. A record showing which user has accessed a given resource and what operations the user performed during a given period.
proxy server
Filter
Audit Trail
Information Technology (IT) infrastructure
18. Weakness in an information system - system security procedures - internal controls - or implementation that could be exploited or triggered by a threat source.
Network Basic Input/Output System (NetBIOS)
reverse lookup; reverse DNS lookup
Vulnerability
File Transfer Protocol (FTP)
19. The act of using numerous electronic serial numbers on a cell phone until a valid number is located.
Timestamping
Accountability
Tumbling
User Datagram Protocol (UDP)
20. Layer 6 of the OSI reference model. The Presentation layer ensures information sent by the Application layer of the sending system will be readable by the Application layer of the receiving system.
Directory Traversal
Presentation layer
Domain Name System (DNS) lookup
CIA triangle
21. A type of DNS transfer - where all records from an SOA are transmitted to the requestor. Zone transfers have two options: full (opcode AXFR) and incremental (IXFR).
Timestamping
Uniform Resource Locator (URL)
Zone transfer
Worm
22. An Application layer protocol for sending electronic mail between servers.
Black Box Testing
ECHO reply
SOA record
Simple Mail Transfer Protocol (SMTP)
23. Host-based IDS. An IDS that resides on the host - protecting against file and folder manipulation and other host-based attacks and actions.
A
Digital Watermarking
HIDS
Event
24. A value used to control cryptographic operations - such as decryption -encryption - signature generation - and signature verification.
infrastructure mode
Cryptographic Key
Simple Object Access Protocol (SOAP)
reconnaissance
25. ICMP Type/Code 8
intranet
Echo request
Backdoor
iris scanner
26. nmap
--randomize_hosts -O OS fingerprinting
proxy server
Internet service provider (ISP)
User Datagram Protocol (UDP)
27. A TCP flag notifying an originating station that the preceding packet (or packets) has been received.
Extensible Authentication Protocol (EAP)
Exploit
Rijndael
Acknowledgment (ACK)
28. In a classful IPv4 subnet - this is the network number with all binary 0s in the subnet part of the number. When written in decimal - the zero subnet has the same number as the classful network number.
parallel scan & 75 sec timeout & 0.3 sec/probe
session splicing
Zero Subnet
steganography
29. A communications path - such as the Internet - authorized for data transmission within a computer system or network.
overt channel
-P0
patch
RID Resource identifier
30. An information assurance strategy in which multiple layers of defense are placed throughout an Information Technology system.
Defense in Depth
Traceroute
remote access
firewall
31. A piece of software - provided by the vendor - intended to update or fix known - discovered problems in a computer program or its supporting data.
Videocipher II Satellite Encryption System
patch
Decryption
Internet Control Message Protocol (ICMP)
32. Any kind of connection that allows you to see all traffic passing by. Generally used in reference to a NIDS (network-based IDS) to monitor all traffic.
Asynchronous
network tap
Computer Emergency Response Team (CERT)
identity theft
33. Security measures - such as a locked door - perimeter fence - or security guard - to prevent or deter physical access to a facility - resource - or information stored on physical media.
Tunneling
Simple Network Management Protocol (SNMP)
ping sweep
physical security
34. A function that is easy to compute in one direction - yet believed to be difficult to compute in the opposite direction (finding its inverse) without special information - called the 'trapdoor.' Widely used in cryptography.
SMB
Internet Control Message Protocol (ICMP)
Authorization
Trapdoor Function
35. ICMP Ping
Countermeasures
-PI
Data Encryption Standard (DES)
Virus
36. A denial-of-service attack where the attacker sends a ping to the network's broadcast address from the spoofed IP address of the target. All systems in the subnet then respond to the spoofed address - eventually flooding the device.
Network Address Translation (NAT)
service level agreements (SLAs)
Smurf attack
packet filtering
37. A wireless LAN device that acts as a central point for all wireless traffic. The AP is connected to both the wireless LAN and the wired LAN - providing wireless clients access to network resources.
remote procedure call (RPC)
security by obscurity
Access Point (AP)
Blowfish
38. A fully qualified domain name consists of a host and domain name - including a top-level domain such as .com - .net - .mil - .edu -and so on.
-sL
intrusion detection system (IDS)
Internet Protocol Security (IPSec) architecture
fully qualified domain name (FQDN)
39. A backlog of packets stored in buffers and waiting to be forwarded over an interface.
Algorithm
parallel scan & 75 sec timeout & 0.3 sec/probe
Data Encryption Standard (DES)
queue
40. A protocol for exchanging packets over a serial line.
Covert Channel
out-of-band signaling
Serial Line Internet Protocol (SLIP)
Exploit
41. Computer software or hardware that can intercept and log traffic passing over a digital network.
SID
Event
HTTP tunneling
sniffer
42. A set of hardware - software - people - policies - and procedures needed to create - manage - distribute - use - store - and revoke digital certificates.
Cryptography
public key infrastructure (PKI)
File Transfer Protocol (FTP)
Simple Object Access Protocol (SOAP)
43. The default network authentication suite of protocols for Windows NT 4.0
firewall
Directory Traversal
Tiger Team
NT LAN Manager (NTLM)
44. Physical socket provided on routers and switches for cable connections between a computer and the router/switch. This connection enables the computer to configure - query - and troubleshoot the router/switch by use of a terminal emulator and a comman
Console Port
Acknowledgment (ACK)
Three-Way (TCP) Handshake
steganography
45. An approach to restricting system access to authorized users in which roles are created for various job functions. The permissions to perform certain operations are assigned to specific roles. Members of staff (or other system users) are assigned par
role-based access control
Computer-Based Attack
U P F
inference attack
46. The process of attaching a particular protocol header and trailer to a unit of data before transmission on the network. Occurs at layer 2 of the OSI reference model.
encapsulation
Password Authentication Protocol (PAP)
-sI
Possession of access devices
47. Chronological record of system activities to enable the reconstruction and examination of the sequence of events and changes in an event.
Audit Data
patch
flood
Domain Name
48. The science or study of protecting information - whether in transit or at rest - by using techniques to render the information unusable to anyone who does not possess the means to decrypt it.
smart card
Information Technology (IT) infrastructure
Access Control List (ACL)
Cryptography
49. Shifting responsibility from one party to another
Echo request
Fast Ethernet
hashing algorithm
risk transference
50. In regard to hash algorithms - this occurs when two or more distinct inputs produce the same output.
Collision
Wi-Fi
Buffer Overflow
Simple Mail Transfer Protocol (SMTP)