SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A background process found in Unix - Linux - Solaris - and other Unix-based operating systems.
Daemon
Level III assessment
Malware
Information Technology (IT) asset valuation
2. A cell phone attack in which the serial number from one cell phone is copied to another in an effort to copy the cell phone.
gray hat
Reconnaissance - Scanning - Gaining Access - Maintaining Access - Covering Tracks
Cloning
Computer Emergency Response Team (CERT)
3. White box test
Domain Name System (DNS) cache poisoning
service level agreements (SLAs)
Banner Grabbing
Internal access to the network
4. A security protocol for wireless local area networks defined in the 802.11b standard; intended to provide the same level of security as a wired LAN. WEP is not considered strong security - although it does authenticate clients to access points - encr
Tiger Team
serialize scans & 15 sec wait
Wired Equivalent Privacy (WEP)
forwarding
5. A program designed to browse websites in an automated - methodical manner. Sometimes these programs are used to harvest information from websites - such as e-mail addresses.
keylogger
Mantrap
Digital Certificate
Web Spider
6. A utility that sends an ICMP Echo message to determine if a specific IP address is accessible; if the message receives a reply - the address is reachable.
heuristic scanning
Packet Internet Groper (ping)
shrink-wrap code attacks
spam
7. A situation in which an IDS or other sensor triggers on an event as an intrusion attempt - when it was actually legitimate traffic.
false negative
-sF
War Chalking
Bluetooth
8. NSA
Tunneling Virus
Access Creep
National Security Agency
Open System Interconnection (OSI) Reference Model
9. Aggressive scan timing
parallel scan & 300 sec timeout & 1.25 sec/probe
-b
Bug
Blowfish
10. A wireless networking mode where all clients connect to the wireless network through a central access point.
Cookie
infrastructure mode
port scanning
out-of-band signaling
11. A partially protected zone on a network - not exposed to the full fury of the Internet - but not fully behind the firewall. This technique is typically used on parts of the network that must remain open to the public (such as a web server) but must a
War Chalking
Demilitarized Zone (DMZ)
hybrid attack
Domain Name System (DNS) cache poisoning
12. When an authorized person allows (intentionally or unintentionally) someone to pass through a secure door - despite the fact that the intruder does not have a badge.
piggybacking
packet
polymorphic virus
Acknowledgment (ACK)
13. An international organization composed of national standards bodies from over 75 countries. Developed the OSI reference model.
Hypertext Transfer Protocol Secure (HTTPS)
International Organization for Standardization (ISO)
Vulnerability Scanning
phishing
14. A sublayer of layer 2 of the OSI model - the Data Link layer. It provides addressing and channel access control mechanisms that enable several terminals or network nodes to communicate within a multipoint network.
Media Access Control (MAC)
Active Directory (AD)
Zombie
proxy server
15. A card with a built-in microprocessor and memory used for identification or financial transactions. The card transfers data to and from a central computer when inserted into a reader.
smart card
script kiddie
Computer-Based Attack
nslookup
16. A social-engineering attack that manipulates the victim into calling the attacker for help.
Address Resolution Protocol (ARP)
reverse social engineering
ping sweep
XOR Operation
17. A collection of historical records or the place where they are kept. In computing - an archive generally refers to backup copies of logs and/or data.
XOR Operation
Antivirus (AV) software
impersonation
Archive
18. A principle in security engineering that attempts to use anonymity and secrecy (of design - implementation - and so on) to provide security; the footprint of the organization - entity - network - or system is kept as small as possible to avoid intere
security by obscurity
EDGAR database
fully qualified domain name (FQDN)
Assessment
19. TCP connect() scan
-sT
Wired Equivalent Privacy (WEP)
Hypertext Transfer Protocol Secure (HTTPS)
Domain Name System (DNS)
20. nmap
Secure Multipurpose Mail Extension (S/MIME)
POP 3
-p <port ranges>
port knocking
21. In penetration testing - this is a method of testing the security of a system or subnet without any previous knowledge of the device or network. Designed to simulate an attack by an outside intruder (usually from the Internet).
Black Box Testing
Copyright
Bluesnarfing
Google hacking
22. The contents of a packet. A system attack requires the attacker to deliver a malicious payload that is acted upon and executed by the system.
payload
802.11 i
Countermeasures
Ethical Hacker
23. Port 135
flood
RPC-DCOM
Third Party
audit
24. The act of checking some sequence of tokens for the presence of the constituents of some pattern.
-P0
footprinting
pattern matching
initial sequence number (ISN)
25. A security tool designed to protect a system or network against attacks by comparing traffic patterns against a list of both known attack signatures and general characteristics of how attacks may be carried out. Threats are rated and reported.
NT LAN Manager (NTLM)
intrusion detection system (IDS)
Cache
Smurf attack
26. The potential for damage to or loss of an IT asset
open source
integrity
risk
Vulnerability Assessment
27. Nmap grepable output
War Chalking
Hacks with permission
-oG
Address Resolution Protocol (ARP) table
28. List Scan
Last In First Out (LIFO)
protocol stack
-sL
Port Address Translation (PAT)
29. A utility that traces a packet from your computer to an Internet host - showing how many hops the packet takes to reach the host and how long the packet requires to complete the hop.
POST
Minimum acceptable level of risk
Traceroute
War Dialing
30. A method of evaluating the security of a computer system or network by simulating an attack from a malicious source.
penetration testing
CAM table
inference attack
Daemon
31. Controls internal to a system designed to resolve vulnerabilities and errors soon after they arise.
passive attack
Corrective Controls
security kernel
spoofing
32. The conveying of official access or legal power to a person or entity.
Authorization
parallel scan
-sS
proxy server
33. A program designed to execute at a specific time to release malicious code onto the computer system or network.
Time Bomb
security kernel
spam
Certificate
34. A piece of software - provided by the vendor - intended to update or fix known - discovered problems in a computer program or its supporting data.
Certificate Authority (CA)
Defines legal email marketing
patch
session hijacking
35. A host designed to collect data on suspicious activity.
Asset
honeypot
Computer Emergency Response Team (CERT)
port redirection
36. The default network authentication suite of protocols for Windows NT 4.0
packet filtering
Daisy Chaining
NT LAN Manager (NTLM)
Information Technology Security Evaluation Criteria (ITSEC)
37. An Application layer protocol for sending electronic mail between servers.
Wi-Fi
Due Diligence
Simple Mail Transfer Protocol (SMTP)
White Box Testing
38. A systematic process for the assessment of security vulnerabilities.
Dumpster Diving
Malware
INFOSEC Assessment Methodology (IAM)
Authentication - Authorization - and Accounting (AAA)
39. A hacker who aims to bring down critical infrastructure for a 'cause' and does not worry about the penalties associated with his actions.
Transport Layer Security (TLS)
War Driving
suicide hacker
Multipartite virus
40. An HTTP command to transmit text to a web server for processing. The opposite of an HTTP GET.
spam
serial scan & 300 sec wait
SYN flood attack
POST
41. LM Hash for short passwords (under 7)
hash
404EE
Domain Name System (DNS) lookup
footprinting
42. A method of falsely identifying the source of data packets; often used by hackers to make it difficult to trace where an attack originated.
gray box testing
spoofing
Eavesdropping
Ciphertext
43. A brand name of analog scrambling and de-scrambling equipment for cable and satellite television - invented primarily to keep consumer Television receive-only (TVRO) satellite equipment from receiving TV programming except on a subscription basis.
Zero Subnet
penetration testing
Bluesnarfing
Videocipher II Satellite Encryption System
44. Hex 14
A series of messages sent by someone attempting to break into a computer to learn about the computer's network services.
Kerberos
A R
Crossover Error Rate (CER)
45. The last portion of the SID that identifies the user to the system in Windows. A RID of 500 identifies the administrator account.
RID Resource identifier
Data Link layer
remote procedure call (RPC)
security breach or security incident
46. 1. The path a packet travels to reach the intended destination. Each individual device along the path traveled is called a hop. 2. Information contained on a device containing instructions for reaching other nodes on the network. This information can
802.11 i
SAM
Buffer Overflow
route
47. MAC Flooding
-sW
gap analysis
Overwhelm CAM table to convert switch to hub mode
asynchronous transmission
48. Name given to expert groups that handle computer security incidents.
Audit Data
Computer Emergency Response Team (CERT)
Reconnaissance - Scanning - Gaining Access - Maintaining Access - Covering Tracks
Fraud and related activity in connection with computers
49. Freely and readily available information on an organization that can be gathered by a business entity about its competitor's customers - products - and marketing - and can be used by an attacker to build useful information for further attacks.
Exposure Factor
Competitive Intelligence
parallel scan & 300 sec timeout & 1.25 sec/probe
NOP
50. Also known as the dot-dot-slash attack. Using directory traversal - the attacker attempts to access restricted directories and execute commands outside intended web server directories by using the URL to redirect to an unintended folder location.
-sA
routed protocol
Directory Traversal
Media Access Control (MAC)
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests