SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A domain composed of all the systems sharing any given physical transport media. Systems within a collision domain may collide with each other during the transmission of data. Collisions can be managed by CSMA/CD (collision detection) or CSMA/CA (col
Sign in Seal
Zero Subnet
Collision Domain
Hierarchical File System (HFS)
2. A U.S. Department of Defense (DoD) standard that sets basic requirements for assessing the effectiveness of computer security controls built into a computer system.
non-repudiation
gray box testing
patch
Trusted Computer System Evaluation Criteria (TCSEC)
3. The process of systematically testing each port on a firewall to map rules and determine accessible ports.
risk
Tumbling
firewalking
Daisy Chaining
4. A software or hardware application or device that captures user keystrokes.
keylogger
Timestamping
red team
MD5
5. Physical socket provided on routers and switches for cable connections between a computer and the router/switch. This connection enables the computer to configure - query - and troubleshoot the router/switch by use of a terminal emulator and a comman
queue
Virtual Private Network (VPN)
Domain Name System (DNS) lookup
Console Port
6. Also known as a public key certificate - this is an electronic file that is used to verify a user's identity - providing non-repudiation throughout the sys-tem. Certificates contain the entity's public key - serial number - version - subject - algori
Digital Certificate
SYN flood attack
intranet
Defense in Depth
7. RPC Scan
-sR
enumeration
Virtual Private Network (VPN)
Temporal Key Integrity Protocol (TKIP)
8. A piece of software - provided by the vendor - intended to update or fix known - discovered problems in a computer program or its supporting data.
GET
Level II assessment
Smurf attack
patch
9. An Application layer protocol used primarily by Microsoft Windows to provide shared access to printers - files - and serial ports. It also provides an authenticated interprocess communication mechanism.
Common Internet File System/Server Message Block
Simple Object Access Protocol (SOAP)
remote procedure call (RPC)
parallel scan & 300 sec timeout & 1.25 sec/probe
10. A principle in security engineering that attempts to use anonymity and secrecy (of design - implementation - and so on) to provide security; the footprint of the organization - entity - network - or system is kept as small as possible to avoid intere
Finding a directory listing and gaining access to a parent or root file for access to other files
-PT
remote access
security by obscurity
11. Calculations of two components of risk: R - the magnitude of the potential loss (L) - and the probability - p - that the loss will occur.
Level I assessment
firewall
Backdoor
quantitative risk assessment
12. A nonnumerical - subjective risk evaluation. Used with qualitative assessment (an evaluation of risk that results in ratings of none - low - medium - and high for the probability.)
End User Licensing Agreement (EULA)
qualitative analysis
Hacks with permission
public key infrastructure (PKI)
13. A unique hostname that is used to identify resources on the Internet. Domain names start with a root (.) - then add a top level (.com - .gov - or .mil - for example) - and a given name space.
risk acceptance
Domain Name
Authorization
Internet Protocol Security (IPSec) architecture
14. A networking configuration where all nodes are connected in a circle with no terminated ends on the cable.
Anonymizer
single loss expectancy (SLE)
Countermeasures
ring topology
15. Baseband LAN specification developed by Xerox Corporation - Intel - and Digital Equipment Corporation. One of the least expensive - most widely deployed networking standards; uses the CSMA/CD method of media access control.
intranet
Biometrics
firewalking
Ethernet
16. Terminal Access Controller Access-Control System. A remote authentication protocol that is used to communicate with an authentication server commonly used in Unix networks.
TACACS
ISO 17799
Bluesnarfing
Community String
17. Directing a protocol from one port to another.
GET
port redirection
Access Creep
Biometrics
18. A means of restricting access to system resources based on the sensitivity (as represented by a label) of the information contained in the system resource and the formal authorization (that is - clearance) of users to access information of such sensi
Mandatory access control (MAC)
Black Hat
Sign in Seal
Destination Unreachable
19. Authentication confirms the identity of the user or device. Authorization determines the privileges (rights) of the user or device. Accounting records the access attempts - both successful and unsuccessful.
Black Box Testing
Database
sidejacking
Authentication - Authorization - and Accounting (AAA)
20. Computer software or hardware that can intercept and log traffic passing over a digital network.
-oN
HTTP tunneling
out-of-band signaling
sniffer
21. Activities to determine the extent to which a security control is implemented correctly - operating as intended - and producing the desired outcome with respect to meeting the security requirements for the system.
Level III assessment
Overwhelm CAM table to convert switch to hub mode
Assessment
White Box Testing
22. An Internet Protocol Security (IPSec) header used to verify that the contents of a packet have not been modified while the packet was in transit.
Service Set Identifier (SSID)
Zone transfer
Authentication Header (AH)
Zero Subnet
23. Hex 29
Database
U P F
polymorphic virus
Directory Traversal
24. Port 53
Countermeasures
honeynet
DNS
self encrypting
25. Attacks that take advantage of the built-in code and scripts most off-the-shelf applications come with.
network interface card (NIC)
Availability
shrink-wrap code attacks
Collision Domain
26. Polymorphic Virus
HTTP
-sF
Internet Assigned Number Authority (IANA)
self encrypting
27. An adapter that provides the physical connection to send and receive data between the computer and the network media.
Post Office Protocol 3 (POP3)
physical security
suicide hacker
network interface card (NIC)
28. Controls to detect anomalies or undesirable events occurring on a system.
rogue access point
End User Licensing Agreement (EULA)
ad hoc mode
Detective Controls
29. The process of determining if a network entity (user or service) is legitimate
reverse lookup; reverse DNS lookup
NetBus
Due Care
Authentication
30. Controls internal to a system designed to resolve vulnerabilities and errors soon after they arise.
Point-to-Point Protocol (PPP)
security by obscurity
Corrective Controls
Hypertext Transfer Protocol Secure (HTTPS)
31. IP Protocol Scan
-sO
asynchronous transmission
replay attack
encryption
32. Malware designed to install some sort of virus - backdoor - and so on - on a target system.
Access Point (AP)
Wireless Local Area Network (WLAN)
Droppers
ping sweep
33. The Security Accounts Manager file in Windows stores all the password hashes for the system.
SAM
security controls
Buffer Overflow
social engineering
34. A TCP flag notifying an originating station that the preceding packet (or packets) has been received.
audit
hacktivism
Minimum acceptable level of risk
Acknowledgment (ACK)
35. TCP connect() scan
SOA record
Pretty Good Privacy (PGP)
-sT
audit
36. One or more locations from which control is exercised over a computer - television broadcast - or telecommunications network.
Denial of Service (DoS)
out-of-band signaling
DNS
network operations center (NOC)
37. A firewall evasion technique whereby packets are wrapped in HTTP - as a covert channel to the target.
Hypertext Transfer Protocol Secure (HTTPS)
risk
HTTP tunneling
honeynet
38. 1. The path a packet travels to reach the intended destination. Each individual device along the path traveled is called a hop. 2. Information contained on a device containing instructions for reaching other nodes on the network. This information can
FreeBSD
identity theft
route
security breach or security incident
39. Using conversation or some other interaction between people to gather useful information.
Contingency Plan
sniffer
stream cipher
human-based social engineering
40. MAC Flooding
Overwhelm CAM table to convert switch to hub mode
802.11 i
NOP
Malicious code
41. Malicious code that uses a polymorphic engine to mutate while keeping the original algorithm intact; the code changes itself each time it runs - but the function of the code will not change.
Kerberos
polymorphic virus
SYN attack
Level II assessment
42. A computer security expert who performs security audits and penetration tests against systems or network segments - with the owner's full knowledge and permission - in an effort to increase security.
Ethical Hacker
Real application encompassing Trojan
Computer Emergency Response Team (CERT)
Database
43. A method in cryptography by which cryptographic keys are exchanged between users - allowing use of a cryptographic algorithm (for example - the Diffie-Hellman key exchange).
key exchange protocol
MD5
segment
POP 3
44. Port 161/162
private network address
SNMP
risk
Collision
45. The process of recording activity on a system for monitoring and later review.
Event
Lightweight Directory Access Protocol (LDAP)
human-based social engineering
Auditing
46. Shifting responsibility from one party to another
GET
Point-to-Point Protocol (PPP)
risk transference
Data Link layer
47. A non-self-replicating program that appears to have a useful purpose - but in reality has a different - malicious purpose.
Defines legal email marketing
Trojan Horse
Simple Object Access Protocol (SOAP)
Open System Interconnection (OSI) Reference Model
48. An attack with the goal of preventing authorized users from accessing services and preventing the normal operation of computers and networks.
route
Corrective Controls
Zone transfer
Denial of Service (DoS)
49. UDP Scan
Videocipher II Satellite Encryption System
-sU
network interface card (NIC)
Traceroute
50. The organization that governs the Internet's top-level domains - IP address allocation - and port number assignments.
reverse lookup; reverse DNS lookup
Internet Assigned Number Authority (IANA)
False Acceptance Rate (FAR)
User Datagram Protocol (UDP)