SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A network administration command-line tool available for many operating systems for querying the Domain Name System (DNS) to obtain domain name or IP address mappings or any other specific DNS record.
port scanning
-sT
Access Point (AP)
nslookup
2. An attack that is direct in nature - usually where the attacker injects something into - or otherwise alters - the network or system target.
Bluejacking
Active Attack
TACACS
Wiretapping
3. A security objective that ensures a resource can be accessed only by authorized users. This is also the property that sensitive information is not disclosed to unauthorized individuals - entities - or processes.
Wired Equivalent Privacy (WEP)
Black Box Testing
Buffer
Confidentiality
4. A text file stored within a browser by a web server that maintains information about the connection. Cookies are used to store information to maintain a unique but consistent surfing experience - but can also contain authentication parameters. Cookie
Cookie
No previous knowledge of the network
limitation of liability and remedies
Certificate
5. Any network incident that prompts some kind of log entry or other notification.
Event
Auditing
Master boot record infector
NOP
6. The rate at which a biometric system will incorrectly reject an access attempt by an authorized user.
Audit Data
false rejection rate (FRR)
Routing Protocol
OpenBSD
7. A device that receives and sends data packets between two or more networks; the packet headers and a forwarding table provide the router with the information necessary for deciding which interface to use to forward packets.
-oA
symmetric encryption
router
Annualized Loss Expectancy (ALE)
8. A network system of servers that translates numeric Internet Protocol (IP) addresses into human-friendly - hierarchical Internet addresses - and vice versa.
intrusion detection system (IDS)
risk acceptance
Trusted Computer Base (TCB)
Domain Name System (DNS)
9. Vulnerability Scanning
The automated process of proactively identifying vulnerabilities of computing systems present in a network
proxy server
Audit Trail
Confidentiality
10. The potential for damage to or loss of an IT asset
risk
intranet
Demilitarized Zone (DMZ)
Daisy Chaining
11. A person or entity indirectly involved in a relationship between two principles.
Third Party
CAM table
hacktivism
serialize scans & 0.4 sec wait
12. The act of secretly listening to the private conversations of others without their consent. This can also be done over telephone lines (wiretapping) - e-mail - instant messaging - and other methods of communication considered private
Eavesdropping
-sU
private key
-sI
13. ICMP Type/Code 0-0
Daisy Chaining
Echo Reply
Computer-Based Attack
Cloning
14. A unique numerical string - created by a hashing algorithm on a given piece of data - used to verify data integrity. Generally hashes are used to verify the integrity of files after download (comparison to the hash value on the site before download)
Malicious code
Internet Protocol Security (IPSec) architecture
hash
Domain Name System (DNS) lookup
15. A device that provides access between two or more networks. Gateways are typically used to connect dissimilar networks.
HIDS
gateway
Backdoor
Tiger Team
16. Traffic-passing technique used by bridges and switches in which traffic received on an interface is sent out all interfaces on the device except the interface on which the information was originally received. Traffic on a switch is flooded when it is
Back orifice
penetration testing
false negative
flood
17. Window Scan
-sW
Point-to-Point Protocol (PPP)
Uniform Resource Locator (URL)
POST
18. An attack that exploits the common mistake many people make when installing operating systems
Address Resolution Protocol (ARP)
Crossover Error Rate (CER)
Competitive Intelligence
operating system attack
19. A Canonical Name record within DNS - used to provide an alias for a domain name.
CNAME record
public key infrastructure (PKI)
Target Of Engagement (TOE)
Point-to-Point Tunneling Protocol (PPTP)
20. A term representing the responsibility managers and their organizations have to provide information security to ensure the type of control - the cost of control - and the deployment of control are appropriate for the system being managed.
hacktivism
Telnet
Redundant Array of Independent Disks (RAID)
Due Care
21. Phases of an attack
Trapdoor Function
404EE
Cryptography
Reconnaissance - Scanning - Gaining Access - Maintaining Access - Covering Tracks
22. A documented process for a procedure designed to be consistent - repeatable - and accountable.
--randomize_hosts -O OS fingerprinting
Replacing numbers in a url to access other files
ad hoc mode
Methodology
23. A host designed to collect data on suspicious activity.
--randomize_hosts -O OS fingerprinting
SSH
Defense in Depth
honeypot
24. A group of people - gathered together by a business entity - working to address a specific problem or goal.
Time exceeded
security incident response team (SIRT)
Tiger Team
public key infrastructure (PKI)
25. The public portion of an asymmetric key pair typically used to encrypt data or verify signatures. Public keys are shared and are used to encrypt messages.
hot site
public key
Discretionary Access Control (DAC)
social engineering
26. A portion of memory used to temporarily store output or input data.
Syslog
Information Technology Security Evaluation Criteria (ITSEC)
Third Party
Buffer
27. Another term for firewalking
Application Layer
ring topology
public key infrastructure (PKI)
port knocking
28. A network deployed as a trap to detect - deflect - or deter unauthorized use of information systems.
fully qualified domain name (FQDN)
Collision Domain
honeynet
remote access
29. The change or growth of a project's scope
War Dialing
Bit Flipping
Detective Controls
scope creep
30. An organized collection of data.
stream cipher
FTP
Database
Cryptography
31. A type of attack used to deny service to legitimate users of a network resource by intentionally overloading the network with illegitimate TCP connection requests. SYN packets are sent repeatedly to the target - but the corresponding SYN/ACK response
nslookup
Simple Object Access Protocol (SOAP)
SYN flood attack
Baseline
32. A method of network traffic filtering that monitors the entire communications process - including the originator of the session and from which direction it started.
Man-in-the-middle attack
Routing Protocol
hash
stateful packet filtering
33. A connectionless - layer 4 transport protocol. UDP is faster than TCP - but offers no reliability. A best effort is made to deliver the data - but no checks and verifications are performed to guarantee delivery. Therefore - UDP is termed a 'connectio
User Datagram Protocol (UDP)
iris scanner
Media Access Control (MAC)
Covert Channel
34. A small Trojan program that listens on port 777.
self encrypting
Tini
net use \[target ip]IPC$ '' /user:''
private network address
35. A fully operational off-site data-processing facility equipped with hardware and system software to be used in the event of a disaster.
Trusted Computer System Evaluation Criteria (TCSEC)
Distributed DoS (DDoS)
hot site
File Allocation Table (FAT)
36. Baseband LAN specification developed by Xerox Corporation - Intel - and Digital Equipment Corporation. One of the least expensive - most widely deployed networking standards; uses the CSMA/CD method of media access control.
Ethernet
stream cipher
Denial of Service (DoS)
router
37. ACK Scan
-sA
Man-in-the-middle attack
single loss expectancy (SLE)
Domain Name System (DNS)
38. The set of all hardware - firmware - and/or software components critical to IT security. Bugs or vulnerabilities occurring inside the TCB might jeopardize the security properties of the entire system.
NetBSD
gap analysis
TACACS
Trusted Computer Base (TCB)
39. A social-engineering attack that manipulates the victim into calling the attacker for help.
reverse social engineering
-sU
private key
RPC-DCOM
40. A method in cryptography by which cryptographic keys are exchanged between users - allowing use of a cryptographic algorithm (for example - the Diffie-Hellman key exchange).
Transmission Control Protocol (TCP)
Finger
Cold Site
key exchange protocol
41. An informed decision to accept the potential for damage to or loss of an IT asset.
-PT
MAC filtering
risk acceptance
Network Address Translation (NAT)
42. A technology that establishes a tunnel to create a private - dedicated - leased-line network over the Internet. The data is encrypted so it's readable only by the sender and receiver. Companies commonly use VPNs to allow employees to connect securely
Transport Layer Security (TLS)
spam
Virtual Private Network (VPN)
Copyright
43. A limit on the amount of time or number of iterations or transmissions in computer and network technology a packet can experience before it will be discarded.
Buffer
Black Hat
Database
Time To Live (TTL)
44. A computer virus that infects and spreads in multiple ways.
encryption
spyware
Multipartite virus
War Dialing
45. An attack where the hacker positions himself between the client and the server - to intercept (and sometimes alter) data traveling between the two.
Common Internet File System/Server Message Block
gateway
Man-in-the-middle attack
Sign in Seal
46. A type 0 ICMP message used to reply to ECHO requests. Used with ping to verify network layer connectivity between hosts.
ECHO reply
network interface card (NIC)
Post Office Protocol 3 (POP3)
security breach or security incident
47. A device providing temporary - on-demand - point-to-point network access to users.
-P0
operating system attack
risk acceptance
network access server
48. Any kind of connection that allows you to see all traffic passing by. Generally used in reference to a NIDS (network-based IDS) to monitor all traffic.
DNS
Tini
network tap
reverse lookup; reverse DNS lookup
49. An agreement between the penetration tester and the client detailing the activities the tester is permitted to perform.
Written Authorization
-p <port ranges>
phishing
Presentation layer
50. A nontechnical method of hacking. Social engineering is the art of manipulating people - whether in person (human-based) or via computing methods (computer-based) - into providing sensitive information.
social engineering
operating system attack
shoulder surfing
rootkit