SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Evaluation in which testers attempt to penetrate the network.
Level III assessment
Bit Flipping
Wi-Fi Protected Access (WPA)
SAM
2. A social-engineering attack using computer resources - such as e-mail or IRC.
Computer-Based Attack
The automated process of proactively identifying vulnerabilities of computing systems present in a network
asynchronous transmission
--randomize_hosts -O OS fingerprinting
3. The default network authentication suite of protocols for Windows NT 4.0
open source
security bulletins
NT LAN Manager (NTLM)
-PT
4. A section or subset of the network. Often a router or other routing device provides the end point of the segment.
Time exceeded
segment
security breach or security incident
open source
5. A standard that provides best-practice recommendations on information security management for use by those responsible for initiating - implementing - or maintaining Information Security Management Systems (ISMS). Information security is defined with
Covert Channel
Fiber Distributed Data Interface (FDDI)
reverse social engineering
ISO 17799
6. All measures and techniques taken to gather information about an intended target. Footprinting can be passive or active.
footprinting
Time Bomb
Zenmap
RID Resource identifier
7. A limited-function version of the Internetworking Operating System (IOS) - held in read-only memory in some earlier models of Cisco devices - capable of performing several seldom-needed low-level functions such as loading a new IOS into Flash memory
Cryptographic Key
false rejection rate (FRR)
RxBoot
Challenge Handshake Authentication Protocol (CHAP)
8. Layer 7 of the OSI reference model. The Application layer provides services to applications - which allow them access to the network. Protocols such as FTP and SMTP reside here.
Application Layer
Corrective Controls
Application-Level Attacks
secure channel
9. An electronic version of junk mail. Unsolicited commercial e-mail sent to numerous recipients.
spam
identity theft
ISO 17799
Information Technology (IT) asset valuation
10. A storage buffer that transparently stores data so future requests for the same data can be served faster.
Authentication
self encrypting
Cache
Rijndael
11. A network system of servers that translates numeric Internet Protocol (IP) addresses into human-friendly - hierarchical Internet addresses - and vice versa.
parallel scan & 75 sec timeout & 0.3 sec/probe
Address Resolution Protocol (ARP) table
Three-Way (TCP) Handshake
Domain Name System (DNS)
12. Normal scan timing
Interior Gateway Protocol (IGP)
Domain Name System (DNS) lookup
DNS enumeration
parallel scan
13. Network Scanning
A procedure for identifying active hosts on a network.
Database
Tiger Team
-sO
14. Management policy and procedures designed to maintain or restore business operations - including computer operations - possibly at an alternate location - in the event of emergencies - system failures - or disaster.
Contingency Plan
War Driving
Exploit
Data Encryption Standard (DES)
15. A piece of code intentionally inserted into a software system that will perform a malicious function when specified conditions are met at some future point.
logic bomb
Asymmetric
Defines legal email marketing
Buffer Overflow
16. CAN-SPAM
spoofing
Defines legal email marketing
Wi-Fi
-sF
17. Content Addressable Memory table. Holds all the MAC-address-to-port mappings on a switch.
CAM table
Fraud and related activity in connection with computers
Rijndael
gateway
18. Software or hardware components that restrict access between a protected network and the Internet - or between other sets of networks - to block unwanted use or attacks.
firewall
-oN
Serial Line Internet Protocol (SLIP)
Hacks with permission
19. A denial-of-service technique that uses numerous hosts to perform the attack.
Master boot record infector
Wide Area Network (WAN)
Distributed DoS (DDoS)
Presentation layer
20. RPC Scan
Simple Object Access Protocol (SOAP)
-sR
LDAP
Address Resolution Protocol (ARP)
21. Port 137/138/139
rogue access point
iris scanner
hacktivism
SMB
22. An authentication method on point-to-point links - using a three-way handshake and a mutually agreed-upon key.
protocol
-sL
Challenge Handshake Authentication Protocol (CHAP)
RxBoot
23. Used for exchanging structured information - such as XML-based messages - in the implementation of web services
-sP
Audit Trail
Replacing numbers in a url to access other files
Simple Object Access Protocol (SOAP)
24. ICMP Type/Code 3
Application Layer
Authorization
hashing algorithm
Destination Unreachable
25. An international encoding standard - working within multiple languages and scripts - that represents each letter - digit - or symbol with a unique numeric value that applies across different platforms.
Unicode
security controls
RID Resource identifier
HTTP tunneling
26. A method of external testing whereby several systems or resources are used together to effect an attack.
Demilitarized Zone (DMZ)
ping sweep
National Security Agency
Daisy Chaining
27. The process of a system providing a fully qualified domain name (FQDN) to a local name server - for resolution to its corresponding IP address.
FreeBSD
signature scanning
HTTP tunneling
Domain Name System (DNS) lookup
28. Any circumstance or event with the potential to adversely impact organizationaloperations - organizational assets - or individuals through an information system via unauthorized access - destruction - disclosure - modification of information - and/or
Bug
Threat
A R
network operations center (NOC)
29. The level of importance assigned to an IT asset
risk transference
Information Technology (IT) asset criticality
Filter
secure channel
30. The rate at which a biometric system will incorrectly identify an unauthorized individual and allow them access (see false negative).
False Acceptance Rate (FAR)
Tiger Team
Finger
private network address
31. Port 161/162
-sI
asynchronous transmission
security controls
SNMP
32. A means of restricting access to system resources based on the sensitivity (as represented by a label) of the information contained in the system resource and the formal authorization (that is - clearance) of users to access information of such sensi
Simple Object Access Protocol (SOAP)
Target Of Engagement (TOE)
Mandatory access control (MAC)
Trusted Computer Base (TCB)
33. Port 31337
Data Link layer
Back orifice
Due Diligence
EDGAR database
34. An informed decision to accept the potential for damage to or loss of an IT asset.
-sA
risk acceptance
Ciphertext
A R
35. A security tool designed to protect a system or network against attacks by comparing traffic patterns against a list of both known attack signatures and general characteristics of how attacks may be carried out. Threats are rated and reported.
routed protocol
-sU
intrusion detection system (IDS)
integrity
36. A standard for encrypting and authenticating MIME data; used primarily for Internet e-mail.
payload
Secure Multipurpose Mail Extension (S/MIME)
Tunneling
net use \[target ip]IPC$ '' /user:''
37. Version Detection Scan
steganography
Hypertext Transfer Protocol Secure (HTTPS)
Tunneling
-sV
38. A TCP flag notifying an originating station that the preceding packet (or packets) has been received.
Acknowledgment (ACK)
Back orifice
risk assessment
John the Ripper - LOphtcrack - Ophtcrack - Cain and Abel
39. The process of using an application to remotely identify open ports on a system (for example - whether systems allow connections through those ports).
Client
port scanning
Syslog
Digital Certificate
40. An e-mail message warning users of a nonexistent virus and encouraging them to pass on the message to other users.
Covert Channel
Access Point (AP)
Kerberos
Virus Hoax
41. A technology where you advertise one IP address externally and data packets are rerouted to the appropriate IP address inside your network by a device providing translation services. In this way - IP addresses of machines on your internal network are
security by obscurity
Network Address Translation (NAT)
false rejection rate (FRR)
Bastion host
42. A piece of software - provided by the vendor - intended to update or fix known - discovered problems in a computer program or its supporting data.
Address Resolution Protocol (ARP) table
patch
Accountability
network access server
43. Controls internal to a system designed to resolve vulnerabilities and errors soon after they arise.
Corrective Controls
-PT
risk transference
No previous knowledge of the network
44. An e-mail protection method using a secret message or image that can be referenced on any official communication with the site; if an e-mail is received without the image or message - the recipient knows it is not legitimate.
Sign in Seal
security kernel
Threat
Level I assessment
45. A means of exchanging information from one entity to another using a process that does not provide an attacker the opportunity to reorder - delete - insert - or read information.
Digital Watermarking
Cryptography
risk
secure channel
46. Polite scan timing
Kerberos
EDGAR database
session splicing
serialize scans & 0.4 sec wait
47. The monetary value assigned to an IT asset.
Possession of access devices
Vulnerability Scanning
rogue access point
Information Technology (IT) asset valuation
48. A Windows-based GUI version of nmap.
Zenmap
Wi-Fi Protected Access (WPA)
Crossover Error Rate (CER)
Ethernet
49. A small space having two sets of interlocking doors; the first set of doors must close before the second set opens. Typically authentication is required for each door - often using different factors. For example - a smart card may open the first door
sniffer
Mantrap
Authentication Header (AH)
Man-in-the-middle attack
50. Hashing algorithm that results in a 128-bit output.
Buffer
-sI
MD5
-PM