SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Using conversation or some other interaction between people to gather useful information.
human-based social engineering
Wrapper
Annualized Loss Expectancy (ALE)
serialize scans & 15 sec wait
2. The directory service created by Microsoft for use on itsnetworks. Provides a variety of network services using Lightweight Directory Access Protocol (LDAP) - Kerberos-based authentication - and single sign-on for user access to network-based resourc
gray box testing
Active Directory (AD)
Common Internet File System/Server Message Block
Active Attack
3. A security objective that ensures a resource can be accessed only by authorized users. This is also the property that sensitive information is not disclosed to unauthorized individuals - entities - or processes.
security incident response team (SIRT)
symmetric encryption
War Dialing
Confidentiality
4. A three-step process computers execute to negotiate a connection with one another. The three steps are SYN - SYN/ACK - ACK.
SSH
Backdoor
network tap
Three-Way (TCP) Handshake
5. A situation in which an IDS or other sensor triggers on an event as an intrusion attempt - when it was actually legitimate traffic.
Droppers
false negative
Corrective Controls
physical security
6. Transmitting one protocol encapsulated inside another protocol.
War Chalking
Zone transfer
Uniform Resource Locator (URL)
Tunneling
7. Software that has advertisements embedded within. Generally displays ads in the form of pop-ups.
Overwhelm CAM table to convert switch to hub mode
Adware
The automated process of proactively identifying vulnerabilities of computing systems present in a network
hashing algorithm
8. A function that is easy to compute in one direction - yet believed to be difficult to compute in the opposite direction (finding its inverse) without special information - called the 'trapdoor.' Widely used in cryptography.
polymorphic virus
Boot Sector Virus
Trapdoor Function
Self Replicating
9. ICMP Type/Code 11
Authorization
Time exceeded
network operations center (NOC)
Written Authorization
10. A computer system that performs tasks dictated by an attacker from a remote location. Zombies may be active or idle - and owners of the systems generally do not know their systems are compromised.
source routing
A
Internet service provider (ISP)
Zombie
11. A remote control program in which the client runs on a local computer and connects to a remote server on a network. Commands entered locally are executed on the remote system.
Trusted Computer System Evaluation Criteria (TCSEC)
Tiger Team
Telnet
Cracker
12. The condition of a resource being ready for use and accessible by authorized users.
Echo request
Simple Object Access Protocol (SOAP)
Availability
spam
13. A string that represents the location of a web resource
security incident response team (SIRT)
Uniform Resource Locator (URL)
Data Link layer
polymorphic virus
14. MAC Flooding
Overwhelm CAM table to convert switch to hub mode
node
The automated process of proactively identifying vulnerabilities of computing systems present in a network
Wiretapping
15. Calculations of two components of risk: R - the magnitude of the potential loss (L) - and the probability - p - that the loss will occur.
Exposure Factor
quantitative risk assessment
Competitive Intelligence
risk assessment
16. Insane scan timing
Local Administrator
SYN flood attack
parallel scan & 75 sec timeout & 0.3 sec/probe
hardware keystroke logger
17. A section or subset of the network. Often a router or other routing device provides the end point of the segment.
Pretty Good Privacy (PGP)
segment
Interior Gateway Protocol (IGP)
SYN flood attack
18. Text or data in its encrypted form; the result of plaintext being input into a cryptographic algorithm.
Address Resolution Protocol (ARP) table
Console Port
Ciphertext
-sL
19. Port 80/81/8080
HTTP
Certificate
Echo request
Whois
20. The secret portion of an asymmetric key pair typically used to decrypt or digitally sign data. The private key is never shared and is always used for decryption - with one notable exception: The private key is used to encrypt the digital signature.
private key
--randomize_hosts -O OS fingerprinting
Accountability
Biometrics
21. Software used to bind a Trojan and a legitimate program together so the Trojan will be installed when the legitimate program is executed.
Discretionary Access Control (DAC)
Simple Object Access Protocol (SOAP)
Wrapper
Adware
22. Port 22
Internet Protocol (IP)
Black Hat
Data Link layer
SSH
23. The act of checking some sequence of tokens for the presence of the constituents of some pattern.
gateway
Institute of Electrical and Electronics Engineers (IEEE)
Asymmetric Algorithm
pattern matching
24. Sneaky scan timing
Cold Site
Zone transfer
serialize scans & 15 sec wait
User Datagram Protocol (UDP)
25. Port 31337
Black Hat
spoofing
network access server
Back orifice
26. A security protocol for wireless local area networks defined in the 802.11b standard; intended to provide the same level of security as a wired LAN. WEP is not considered strong security - although it does authenticate clients to access points - encr
Wired Equivalent Privacy (WEP)
Malware
Echo Reply
network access server
27. Black box test
No previous knowledge of the network
RPC-DCOM
Due Care
serialize scans & 0.4 sec wait
28. The monetary value expected from the occurrence of a risk on an asset. It is mathematically expressed as single loss expectancy (SLE) = asset value (AV)
single loss expectancy (SLE)
piggybacking
The automated process of proactively identifying vulnerabilities of computing systems present in a network
promiscuous mode
29. Activities to determine the extent to which a security control is implemented correctly - operating as intended - and producing the desired outcome with respect to meeting the security requirements for the system.
spoofing
Assessment
Active Fingerprinting
Availability
30. A wireless LAN device that acts as a central point for all wireless traffic. The AP is connected to both the wireless LAN and the wired LAN - providing wireless clients access to network resources.
RID Resource identifier
Access Point (AP)
Bluesnarfing
packet filtering
31. An attack in which a hacker steps between two ends of an already-established communication session and uses specialized tools to guess sequence numbers to take over the channel.
Banner Grabbing
patch
session hijacking
Annualized Loss Expectancy (ALE)
32. Computer software or hardware that can intercept and log traffic passing over a digital network.
firewalking
network interface card (NIC)
sniffer
Trojan Horse
33. A method of defining what rights and permissions an entity has to a given resource. In networking - Access Control Lists are commonly associated with firewall and router traffic filtering rules.
802.11
Access Point (AP)
Access Control List (ACL)
quality of service (QoS)
34. A piece of code intentionally inserted into a software system that will perform a malicious function when specified conditions are met at some future point.
Discretionary Access Control (DAC)
phishing
logic bomb
Kerberos
35. A program designed to browse websites in an automated - methodical manner. Sometimes these programs are used to harvest information from websites - such as e-mail addresses.
Web Spider
-sR
hardware keystroke logger
spoofing
36. A file system used by the Mac OS.
Access Creep
Hierarchical File System (HFS)
Exploit
network tap
37. A set of rules defined by a system administrator that indicates whether access is allowed or denied to resource objects.
Confidentiality
rule-based access control
rogue access point
Possession of access devices
38. Hex 14
A R
stream cipher
Web Spider
risk acceptance
39. Layer 2 of the OSI reference model. This layer provides reliable transit of data across a physical link. The Data Link layer is concerned with physical addressing - network topology - access to the network medium - error detection - sequential delive
nslookup
remote access
Data Link layer
Authentication Header (AH)
40. Hex 04
Mandatory access control (MAC)
Annualized Loss Expectancy (ALE)
Telnet
R
41. A program or piece of code inserted into a system - usually covertly - with the intent of compromising the confidentiality - integrity - or availability of the victim's data - applications - or operating system. Malware consists of viruses - worms -
War Chalking
SMB
Malware
security kernel
42. Vulnerability Scanning
The automated process of proactively identifying vulnerabilities of computing systems present in a network
security kernel
-sP
-sS
43. PI and PT Ping
Black Box Testing
-P0
Active Fingerprinting
-PB
44. An information assurance strategy in which multiple layers of defense are placed throughout an Information Technology system.
Institute of Electrical and Electronics Engineers (IEEE)
Defense in Depth
Challenge Handshake Authentication Protocol (CHAP)
Accountability
45. Authentication confirms the identity of the user or device. Authorization determines the privileges (rights) of the user or device. Accounting records the access attempts - both successful and unsuccessful.
Authentication - Authorization - and Accounting (AAA)
Eavesdropping
intrusion detection system (IDS)
remote access
46. The change or growth of a project's scope
Daisy Chaining
non-repudiation
stream cipher
scope creep
47. Provides router-to-router or host-to-network connections over asynchronous and synchronous circuits.
Wrapper
Point-to-Point Protocol (PPP)
qualitative analysis
Challenge Handshake Authentication Protocol (CHAP)
48. Software or hardware components that restrict access between a protected network and the Internet - or between other sets of networks - to block unwanted use or attacks.
firewall
hacktivism
Man-in-the-middle attack
keylogger
49. An Internet Protocol Security (IPSec) header used to verify that the contents of a packet have not been modified while the packet was in transit.
Covert Channel
Authentication Header (AH)
intrusion detection system (IDS)
Service Set Identifier (SSID)
50. The process of systematically testing each port on a firewall to map rules and determine accessible ports.
Wide Area Network (WAN)
firewalking
Exploit
Videocipher II Satellite Encryption System
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests