SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A network architecture framework developed by ISO that describes the communications process between two systems across the Internet in seven distinct layers.
personal identification number (PIN)
hot site
Open System Interconnection (OSI) Reference Model
Man-in-the-middle attack
2. Looking over an authorized user's shoulder in order to steal information (such as authentication information).
shoulder surfing
flood
Pretty Good Privacy (PGP)
Replacing numbers in a url to access other files
3. An unknown deficiency in software or some other product that results in a security vulnerability being identified.
security defect
Routing Information Protocol (RIP)
-sU
phishing
4. A communications path - such as the Internet - authorized for data transmission within a computer system or network.
-oX
Audit Trail
overt channel
-sT
5. Unauthorized access to information such as a calendar - contact list - e-mails - and text messages on a wireless device through a Bluetooth connection.
Bluesnarfing
Client
phishing
Redundant Array of Independent Disks (RAID)
6. A point of reference used to mark an initial state in order to manage change.
FreeBSD
session splicing
Baseline
heuristic scanning
7. Layer 7 of the OSI reference model. The Application layer provides services to applications - which allow them access to the network. Protocols such as FTP and SMTP reside here.
Multipurpose Internet Mail Extensions (MIME)
Application Layer
-sV
Bluesnarfing
8. PI and PT Ping
Kerberos
-PB
Vulnerability Assessment
Challenge Handshake Authentication Protocol (CHAP)
9. Phases of an attack
Banner Grabbing
Auditing
Reconnaissance - Scanning - Gaining Access - Maintaining Access - Covering Tracks
Point-to-Point Tunneling Protocol (PPTP)
10. A system used by the Securities and Exchange Commission (SEC) for companies and businesses to transmit required filings and information. The EDGAR database performs automated collection - validation - indexing - acceptance - and forwarding of submiss
SNMP
Wi-Fi
EDGAR database
Packet Internet Groper (ping)
11. A set of hardware - software - people - policies - and procedures needed to create - manage - distribute - use - store - and revoke digital certificates.
Directory Traversal
Wi-Fi Protected Access (WPA)
public key infrastructure (PKI)
Tunnel
12. A list of IP addresses and corresponding MAC addresses stored on a local computer.
War Dialing
XOR Operation
Address Resolution Protocol (ARP) table
halo effect
13. The process of sending a packet or frame toward the destination. In a switch - messages are forwarded only to the port they are addressed to.
Syslog
forwarding
Due Diligence
Block Cipher
14. ICMP Type/Code 3-13
Data Encryption Standard (DES)
network access server
-PM
Administratively Prohibited
15. A method of permitting only MAC addresses in a preapproved list network access. Addresses not matching are blocked.
signature scanning
MAC filtering
security kernel
gateway
16. FIN Scan
Ethical Hacker
Copyright
-sF
Trojan Horse
17. A hacking method for stealing the cookies used during a session build and replaying them for unauthorized connection purposes.
Replacing numbers in a url to access other files
security kernel
NT LAN Manager (NTLM)
sidejacking
18. CAN-SPAM
Black Hat
sniffer
-sA
Defines legal email marketing
19. A small space having two sets of interlocking doors; the first set of doors must close before the second set opens. Typically authentication is required for each door - often using different factors. For example - a smart card may open the first door
Wiretapping
Buffer Overflow
Mantrap
-sA
20. Content Addressable Memory table. Holds all the MAC-address-to-port mappings on a switch.
802.11
network access server
CAM table
Internet Assigned Number Authority (IANA)
21. A method for detecting malicious code on a computer where the files are compared to signatures of known viruses stored in a database.
signature scanning
Internal access to the network
Computer Emergency Response Team (CERT)
Tunneling Virus
22. Provides data encryption for IEEE 802.11 wireless networks so data can only be decrypted by the intended recipients.
Wi-Fi Protected Access (WPA)
session splicing
-sF
Rijndael
23. A piece of software - provided by the vendor - intended to update or fix known - discovered problems in a computer program or its supporting data.
patch
asynchronous transmission
Wired Equivalent Privacy (WEP)
inference attack
24. A communications protocol used for browsing the Internet.
Hypertext Transfer Protocol (HTTP)
reverse social engineering
Methodology
honeynet
25. Vulnerability Scanning
sidejacking
Reconnaissance - Scanning - Gaining Access - Maintaining Access - Covering Tracks
Active Fingerprinting
The automated process of proactively identifying vulnerabilities of computing systems present in a network
26. Software or firmware intended to perform an unauthorized process that will have an adverse impact on the confidentiality - integrity - or availability of an information system. A virus - worm - Trojan horse - or other code-based entity that infects a
Banner Grabbing
ring topology
personal identification number (PIN)
Malicious code
27. A social-engineering attack that manipulates the victim into calling the attacker for help.
audit
reverse social engineering
port knocking
Tunneling
28. The software product or system that is the subject of an evaluation.
False Acceptance Rate (FAR)
Copyright
self encrypting
Target Of Engagement (TOE)
29. A small Trojan program that listens on port 777.
inference attack
queue
Anonymizer
Tini
30. The public portion of an asymmetric key pair typically used to encrypt data or verify signatures. Public keys are shared and are used to encrypt messages.
steganography
public key
Vulnerability Assessment
Simple Object Access Protocol (SOAP)
31. Recording the time - normally in a log file - when an event happens or when information is created or modified.
protocol
Zone transfer
NOP
Timestamping
32. Name given to expert groups that handle computer security incidents.
audit
Computer Emergency Response Team (CERT)
A R
-oA
33. In regard to hash algorithms - this occurs when two or more distinct inputs produce the same output.
Collision
port scanning
single loss expectancy (SLE)
Destination Unreachable
34. A section or subset of the network. Often a router or other routing device provides the end point of the segment.
Pretty Good Privacy (PGP)
A
segment
Asymmetric
35. Layer 6 of the OSI reference model. The Presentation layer ensures information sent by the Application layer of the sending system will be readable by the Application layer of the receiving system.
Videocipher II Satellite Encryption System
A S
Presentation layer
quality of service (QoS)
36. An encryption standard designed by Joan Daemen and Vincent Rijmen. Chosen by a NIST contest to be the Advanced Encryption Standard (AES).
Rijndael
Routing Protocol
Malicious code
non-repudiation
37. A computer network confined to a relatively small area - such as a single building or campus.
rule-based access control
local area network (LAN)
Droppers
Timestamping
38. The steps taken to gather evidence and information on the targets you wish to attack.
White Box Testing
Discretionary Access Control (DAC)
Last In First Out (LIFO)
reconnaissance
39. A derogatory term used to describe an attacker - usually new to the field - who uses simple - easy-to-follow scripts or programs developed by others to attack computer systems and networks and deface websites.
A R
FTP
Buffer Overflow
script kiddie
40. A limit on the amount of time or number of iterations or transmissions in computer and network technology a packet can experience before it will be discarded.
public key
Master boot record infector
operating system attack
Time To Live (TTL)
41. A fully operational off-site data-processing facility equipped with hardware and system software to be used in the event of a disaster.
hot site
Annualized Loss Expectancy (ALE)
Worm
Exploit
42. A TCP flag notifying an originating station that the preceding packet (or packets) has been received.
social engineering
Acknowledgment (ACK)
Community String
MAC filtering
43. A brand name of analog scrambling and de-scrambling equipment for cable and satellite television - invented primarily to keep consumer Television receive-only (TVRO) satellite equipment from receiving TV programming except on a subscription basis.
Temporal Key Integrity Protocol (TKIP)
Videocipher II Satellite Encryption System
Exposure Factor
Common Internet File System/Server Message Block
44. A value assigned to uniquely identify a single wide area network (WAN) in wireless LANs. SSIDs are broadcast by default - and are sent in the header of every packet. SSIDs provide no encryption or security.
SID
private network address
Service Set Identifier (SSID)
Multipartite virus
45. An HTTP command to transmit text to a web server for processing. The opposite of an HTTP GET.
Serial Line Internet Protocol (SLIP)
Videocipher II Satellite Encryption System
POST
Cracker
46. The process of embedding information into a digital signal in a way that makes it difficult to remove.
Digital Watermarking
-sT
Cryptography
Kerberos
47. A command used in HTTP and FTP to retrieve a file from a server.
Access Control List (ACL)
net use \[target ip]IPC$ '' /user:''
Man-in-the-middle attack
GET
48. A documented process for a procedure designed to be consistent - repeatable - and accountable.
Methodology
Zenmap
intranet
Temporal Key Integrity Protocol (TKIP)
49. Whether purposeful or the result of malware or other attack - a backdoor is a hidden capability in a system or program for bypassing normal computer authentication systems.
network access server
-sT
Backdoor
Syslog
50. A program designed to execute at a specific time to release malicious code onto the computer system or network.
Time Bomb
Decryption
The automated process of proactively identifying vulnerabilities of computing systems present in a network
MAC filtering