SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. 1. The path a packet travels to reach the intended destination. Each individual device along the path traveled is called a hop. 2. Information contained on a device containing instructions for reaching other nodes on the network. This information can
keylogger
nslookup
qualitative analysis
route
2. A wireless access point that has either been installed on a secure company network without explicit authorization from a local network administrator - or has been created to allow a hacker to conduct a man-in-the-middle attack.
quality of service (QoS)
Administratively Prohibited
rogue access point
Computer-Based Attack
3. An early network application that provides information on users currently logged on to a machine.
serialize scans & 15 sec wait
non-repudiation
Finger
Media Access Control (MAC)
4. Any network incident that prompts some kind of log entry or other notification.
Information Technology Security Evaluation Criteria (ITSEC)
Trapdoor Function
Unicode
Event
5. Black hat
Hacks without permission
Hierarchical File System (HFS)
International Organization for Standardization (ISO)
Mandatory access control (MAC)
6. An HTTP command to transmit text to a web server for processing. The opposite of an HTTP GET.
POST
Availability
personal identification number (PIN)
network access server
7. A string used for authentication in SNMP. The public community string is used for read-only searches - whereas the private community string is used for read/write. Community strings are transmitted in clear text in SNMPv1. SNMPv3 provides encryption
Acceptable Use Policy (AUP)
signature scanning
Community String
-oA
8. A protocol used for sending and receiving log information for nodes on a network.
SOA record
Syslog
Algorithm
Hypertext Transfer Protocol (HTTP)
9. An attack that is direct in nature - usually where the attacker injects something into - or otherwise alters - the network or system target.
Active Attack
route
key exchange protocol
Domain Name
10. A partially protected zone on a network - not exposed to the full fury of the Internet - but not fully behind the firewall. This technique is typically used on parts of the network that must remain open to the public (such as a web server) but must a
Demilitarized Zone (DMZ)
Simple Network Management Protocol (SNMP)
Interior Gateway Protocol (IGP)
Authentication Header (AH)
11. Attacks that take advantage of the built-in code and scripts most off-the-shelf applications come with.
shrink-wrap code attacks
Presentation layer
red team
Cold Site
12. Hashing algorithm that results in a 128-bit output.
Competitive Intelligence
MD5
piggybacking
Application-Level Attacks
13. Transmission using channels or frequencies outside those normally used for data transfer; often used for error reporting.
Assessment
A series of messages sent by someone attempting to break into a computer to learn about the computer's network services.
out-of-band signaling
Fraud and related activity in connection with computers
14. The process of sending a packet or frame toward the destination. In a switch - messages are forwarded only to the port they are addressed to.
network access server
forwarding
spoofing
intrusion detection system (IDS)
15. A method of falsely identifying the source of data packets; often used by hackers to make it difficult to trace where an attack originated.
Telnet
Electronic Code Book (ECB)
Tiger Team
spoofing
16. A storage buffer that transparently stores data so future requests for the same data can be served faster.
-b
Macro virus
port redirection
Cache
17. A communications channel that is being used for a purpose it was not intended for - usually to transfer information secretly.
Vulnerability Scanning
Mandatory access control (MAC)
Covert Channel
-sP
18. nmap
Exposure Factor
-p <port ranges>
Confidentiality
Boot Sector Virus
19. An application that monitors a computer or network to identify - and prevent - malware. AV is usually signature-based - and can take multiple actions on defined malware files/activity.
Tunneling
Antivirus (AV) software
parallel scan
Dumpster Diving
20. A proprietary - open - wireless technology used for transferring data from fixed and mobile devices over short distances.
forwarding
Bluetooth
Daemon
intrusion detection system (IDS)
21. Layer 6 of the OSI reference model. The Presentation layer ensures information sent by the Application layer of the sending system will be readable by the Application layer of the receiving system.
Baseline
Community String
Institute of Electrical and Electronics Engineers (IEEE)
Presentation layer
22. A wireless LAN security standard developed by IEEE. Requires Temporal Key Integrity Protocol (TKIP) and Advanced Encryption Standard (AES).
Directory Traversal
Point-to-Point Protocol (PPP)
Trusted Computer Base (TCB)
802.11 i
23. Manipulating a search string with additional specific operators to search for vulnerabilities or very specific information.
-oN
Google hacking
ring topology
GET
24. A type of malware that covertly collects information about a user.
Data Encryption Standard (DES)
spyware
Defines legal email marketing
reconnaissance
25. 18 U.S.C. 1030
Internet Control Message Protocol (ICMP)
Fraud and related activity in connection with computers
Videocipher II Satellite Encryption System
Black Box Testing
26. A portion of memory used to temporarily store output or input data.
Buffer
Discretionary Access Control (DAC)
quantitative risk assessment
halo effect
27. Transmitting one protocol encapsulated inside another protocol.
Authentication Header (AH)
audit
-PP
Tunneling
28. A business - government agency - or educational institution that provides access to the Internet.
-P0
Internet service provider (ISP)
spoofing
Fast Ethernet
29. The security property that data is not modified in an unauthorized and undetected manner. Also - the principle and measures taken to ensure that data received is in the exact same condition and state as when it was originally transmitted.
integrity
Internet Control Message Protocol (ICMP)
SAM
Lightweight Directory Access Protocol (LDAP)
30. Port 22
SSH
Network Basic Input/Output System (NetBIOS)
John the Ripper - LOphtcrack - Ophtcrack - Cain and Abel
Domain Name System (DNS) lookup
31. A security tool designed to protect a system or network against attacks by comparing traffic patterns against a list of both known attack signatures and general characteristics of how attacks may be carried out. Threats are rated and protective measu
shrink-wrap code attacks
Domain Name System (DNS) lookup
DNS
intrusion prevention system (IPS)
32. A remote control program in which the client runs on a local computer and connects to a remote server on a network. Commands entered locally are executed on the remote system.
Telnet
Cloning
Traceroute
OpenBSD
33. A group of experts that handles computer security incidents.
halo effect
Smurf attack
polymorphic virus
security incident response team (SIRT)
34. MAC Flooding
Overwhelm CAM table to convert switch to hub mode
A procedure for identifying active hosts on a network.
TACACS
penetration testing
35. UDP Scan
human-based social engineering
Data Encryption Standard (DES)
-sU
Demilitarized Zone (DMZ)
36. Also known as a public key certificate - this is an electronic file that is used to verify a user's identity - providing non-repudiation throughout the sys-tem. Certificates contain the entity's public key - serial number - version - subject - algori
Internet Control Message Protocol (ICMP)
security defect
infrastructure mode
Digital Certificate
37. A method for detecting malicious code on a computer where the files are compared to signatures of known viruses stored in a database.
signature scanning
passive attack
false rejection rate (FRR)
-b
38. CAN-SPAM
Certificate
fully qualified domain name (FQDN)
inference attack
Defines legal email marketing
39. An API that provides services related to the OSI model's Session layer - allowing applications on separate computers to communicate over a LAN.
Exposure Factor
RxBoot
Network Basic Input/Output System (NetBIOS)
R
40. Devices - connected to one or more switches - grouped logically into a single broadcast domain. VLANs enable administrators to divide the devices connected to the switches into multiple VLANs without requiring separate physical switches.
quantitative risk assessment
Virtual Local Area Network (VLAN)
Black Box Testing
secure channel
41. The public portion of an asymmetric key pair typically used to encrypt data or verify signatures. Public keys are shared and are used to encrypt messages.
Traceroute
public key
Digital Certificate
Virus
42. A method in cryptography by which cryptographic keys are exchanged between users - allowing use of a cryptographic algorithm (for example - the Diffie-Hellman key exchange).
Temporal Key Integrity Protocol (TKIP)
key exchange protocol
Zone transfer
Cache
43. A self-replicating malicious program that attempts installation beneath antivirus software by directly intercepting the interrupt handlers of the operating system to evade detection.
NetBus
intrusion prevention system (IPS)
Tunneling Virus
security defect
44. A social-engineering attack that manipulates the victim into calling the attacker for help.
reverse social engineering
gateway
parallel scan & 75 sec timeout & 0.3 sec/probe
Domain Name System (DNS)
45. A person or entity indirectly involved in a relationship between two principles.
Domain Name System (DNS)
Cracker
Brute-Force Password Attack
Third Party
46. A Windows-based GUI version of nmap.
quality of service (QoS)
Zenmap
Web Spider
Wireless Local Area Network (WLAN)
47. Using conversation or some other interaction between people to gather useful information.
human-based social engineering
Last In First Out (LIFO)
symmetric algorithm
Anonymizer
48. An announcement - typically from a software vendor - of a known security vulnerability in a program; often the bulletin contains instructions for the application of a software patch.
-sI
security bulletins
hashing algorithm
War Chalking
49. Formal description and evaluation of the vulnerabilities in an information system
Covert Channel
Interior Gateway Protocol (IGP)
Vulnerability Assessment
Destination Unreachable
50. RPC Scan
-sR
-sX
gray hat
Tunneling Virus
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests