SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. TCP connect() scan
The automated process of proactively identifying vulnerabilities of computing systems present in a network
quality of service (QoS)
Collision
-sT
2. The science or study of protecting information - whether in transit or at rest - by using techniques to render the information unusable to anyone who does not possess the means to decrypt it.
Authentication - Authorization - and Accounting (AAA)
Mandatory access control (MAC)
Institute of Electrical and Electronics Engineers (IEEE)
Cryptography
3. An attack where the hacker repeats a portion of a cryptographic exchange in hopes of fooling the system into setting up a communications channel.
net use \[target ip]IPC$ '' /user:''
security bulletins
802.11
replay attack
4. A symmetric key cipher where plaintext bits are combined with a pseudo-random cipher bit stream (keystream) - typically by an exclusive-or (XOR) operation. In a stream cipher the plaintext digits are encrypted one at a time - and the transformation o
Tunneling
stream cipher
A S
POP 3
5. A network system of servers that translates numeric Internet Protocol (IP) addresses into human-friendly - hierarchical Internet addresses - and vice versa.
suicide hacker
Cryptography
Temporal Key Integrity Protocol (TKIP)
Domain Name System (DNS)
6. An extensible mechanism for e-mail. A variety of MIME types exist for sending content such as audio - binary - or video using the Simple Mail Transfer Protocol (SMTP).
Discretionary Access Control (DAC)
ad hoc mode
Multipurpose Internet Mail Extensions (MIME)
security bulletins
7. A unit of information formatted according to specific protocols that allows precise transmittal of data from one network node to another. Also called a datagram or data packet - a packet contains a header (container) and a payload (contents). Any IP
Fraud and related activity in connection with computers
Competitive Intelligence
packet
SMB
8. The set of all hardware - firmware - and/or software components critical to IT security. Bugs or vulnerabilities occurring inside the TCB might jeopardize the security properties of the entire system.
Assessment
Buffer
Trusted Computer Base (TCB)
rule-based access control
9. A group of experts that handles computer security incidents.
security incident response team (SIRT)
heuristic scanning
Auditing
Request for Comments (RFC)
10. A function that is easy to compute in one direction - yet believed to be difficult to compute in the opposite direction (finding its inverse) without special information - called the 'trapdoor.' Widely used in cryptography.
Asymmetric Algorithm
segment
risk avoidance
Trapdoor Function
11. An Application layer protocol used primarily by Microsoft Windows to provide shared access to printers - files - and serial ports. It also provides an authenticated interprocess communication mechanism.
Common Internet File System/Server Message Block
ping sweep
XOR Operation
-P0
12. ICMP Timestamp
Transport Layer Security (TLS)
-PP
U P F
Simple Mail Transfer Protocol (SMTP)
13. The use of deceptive computer-based means to trick individuals into disclosing sensitive personal information
XOR Operation
John the Ripper - LOphtcrack - Ophtcrack - Cain and Abel
phishing
-sO
14. Hex 14
Back orifice
-oX
payload
A R
15. Sneaky scan timing
serialize scans & 15 sec wait
-sP
Videocipher II Satellite Encryption System
Filter
16. An adapter that provides the physical connection to send and receive data between the computer and the network media.
Access Creep
network interface card (NIC)
-sT
CIA triangle
17. A well-known and studied phenomenon of human nature - whereby a single trait influences the perception of other traits.
replay attack
HTTP
Bastion host
halo effect
18. The default network authentication suite of protocols for Windows NT 4.0
--randomize_hosts -O OS fingerprinting
DNS
NT LAN Manager (NTLM)
Vulnerability Scanning
19. The change or growth of a project's scope
Hypertext Transfer Protocol (HTTP)
Fiber Distributed Data Interface (FDDI)
Last In First Out (LIFO)
scope creep
20. A computer placed outside a firewall to provide public services to other Internet sites - and hardened to resist external attacks.
Bastion host
false rejection rate (FRR)
sheepdip
ECHO reply
21. Another term for firewalking
port knocking
Tumbling
Buffer
nslookup
22. An attack against an authentication protocol in which the attacker intercepts data in transit along the network between the claimant and verifier - but does not alter the data (in other words - eavesdropping).
passive attack
ISO 17799
Address Resolution Protocol (ARP) table
stream cipher
23. A text file stored within a browser by a web server that maintains information about the connection. Cookies are used to store information to maintain a unique but consistent surfing experience - but can also contain authentication parameters. Cookie
Domain Name System (DNS) cache poisoning
Tunneling Virus
Cookie
hot site
24. A method for detecting malicious code on a computer where the files are compared to signatures of known viruses stored in a database.
public key infrastructure (PKI)
symmetric algorithm
signature scanning
HTTP
25. A hacking method for stealing the cookies used during a session build and replaying them for unauthorized connection purposes.
Domain Name System (DNS) lookup
sidejacking
security by obscurity
Access Point (AP)
26. Calculations of two components of risk: R - the magnitude of the potential loss (L) - and the probability - p - that the loss will occur.
-PT
SOA record
quantitative risk assessment
Point-to-Point Tunneling Protocol (PPTP)
27. Ports 20/21
ping sweep
remote procedure call (RPC)
FTP
National Security Agency
28. A physical security attack where the attacker sifts through garbage and recycle bins for information that may be useful on current and future attacks
Active Directory (AD)
Dumpster Diving
session splicing
encapsulation
29. Port 31337
Timestamping
Three-Way (TCP) Handshake
-sA
Back orifice
30. An approach to restricting system access to authorized users in which roles are created for various job functions. The permissions to perform certain operations are assigned to specific roles. Members of staff (or other system users) are assigned par
Wiretapping
SYN flood attack
Redundant Array of Independent Disks (RAID)
role-based access control
31. A three-step process computers execute to negotiate a connection with one another. The three steps are SYN - SYN/ACK - ACK.
--randomize_hosts -O OS fingerprinting
Three-Way (TCP) Handshake
Extensible Authentication Protocol (EAP)
service level agreements (SLAs)
32. A type of DNS transfer - where all records from an SOA are transmitted to the requestor. Zone transfers have two options: full (opcode AXFR) and incremental (IXFR).
Zone transfer
Fast Ethernet
No previous knowledge of the network
footprinting
33. A free and popular version of the Unix operating system.
Authentication Header (AH)
-b
FreeBSD
Tunneling Virus
34. A computer network confined to a relatively small area - such as a single building or campus - in which devices connect through high-frequency radio waves using IEEE standard 802.11.
-oN
Wireless Local Area Network (WLAN)
iris scanner
SNMP
35. A security protocol used in IEEE 802.11i to replace WEP without the requirement to replace legacy hardware.
intranet
Temporal Key Integrity Protocol (TKIP)
POST
halo effect
36. A business - government agency - or educational institution that provides access to the Internet.
Internet service provider (ISP)
Acknowledgment (ACK)
Hacks with permission
404EE
37. IP Protocol Scan
Echo Reply
SSH
Active Directory (AD)
-sO
38. Nmap grepable output
-oG
Rijndael
No previous knowledge of the network
protocol stack
39. Port 110
OpenBSD
Collision Domain
Fiber Distributed Data Interface (FDDI)
POP 3
40. Paranoid scan timing
Transmission Control Protocol (TCP)
serial scan & 300 sec wait
Password Authentication Protocol (PAP)
SSH
41. An e-mail protection method using a secret message or image that can be referenced on any official communication with the site; if an e-mail is received without the image or message - the recipient knows it is not legitimate.
Cracker
Sign in Seal
non-repudiation
Self Replicating
42. An organized collection of data.
Smurf attack
Buffer
routed protocol
Database
43. A hardware device used to log keystrokes covertly. Hardware keystroke loggers are very dangerous due to the fact that they cannot be detected through regular software/anti-malware scanning.
Wi-Fi
hardware keystroke logger
Due Care
Rijndael
44. An information assurance strategy in which multiple layers of defense are placed throughout an Information Technology system.
Defense in Depth
Secure Sockets Layer (SSL)
Google hacking
service level agreements (SLAs)
45. A network deployed as a trap to detect - deflect - or deter unauthorized use of information systems.
spam
honeynet
Point-to-Point Tunneling Protocol (PPTP)
Confidentiality
46. Safeguards or countermeasures to avoid - counteract - or minimize security risks.
-oN
replay attack
security controls
Domain Name System (DNS)
47. A method used to prevent IDS detection by dividing the request into multiple parts that are sent in different packets
Challenge Handshake Authentication Protocol (CHAP)
Interior Gateway Protocol (IGP)
session splicing
risk avoidance
48. A TCP flag notifying an originating station that the preceding packet (or packets) has been received.
segment
Buffer
-sR
Acknowledgment (ACK)
49. An agreement between the penetration tester and the client detailing the activities the tester is permitted to perform.
Written Authorization
Point-to-Point Tunneling Protocol (PPTP)
gray hat
Bluetooth
50. Port 53
ISO 17799
False Acceptance Rate (FAR)
DNS
Eavesdropping