SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Chronological record of system activities to enable the reconstruction and examination of the sequence of events and changes in an event.
Audit Data
stateful packet filtering
Information Technology (IT) asset valuation
non-repudiation
2. A virus that plants itself in a system's boot sector and infects the master boot record.
Boot Sector Virus
Service Set Identifier (SSID)
reverse lookup; reverse DNS lookup
fragmentation
3. Used to find the domain name associated with an IP address; the opposite of a DNS lookup.
reverse lookup; reverse DNS lookup
asynchronous transmission
parameter tampering
Audit Trail
4. A network system of servers that translates numeric Internet Protocol (IP) addresses into human-friendly - hierarchical Internet addresses - and vice versa.
Computer-Based Attack
port redirection
Domain Name System (DNS)
Data Link layer
5. A network traffic management technique designed to allow applications to specify the route a packet will take to a destination - regardless of what the route tables between the two systems say.
War Chalking
source routing
Certificate Authority (CA)
Transport Layer Security (TLS)
6. A hybrid of the HTTP and SSL/TLS protocols that provides encrypted communication and secure identification of a web server.
404EE
Vulnerability
Bluetooth
Hypertext Transfer Protocol Secure (HTTPS)
7. A method in cryptography by which cryptographic keys are exchanged between users - allowing use of a cryptographic algorithm (for example - the Diffie-Hellman key exchange).
Packet Internet Groper (ping)
Back orifice
Address Resolution Protocol (ARP) table
key exchange protocol
8. An evaluation conducted to determine the potential for damage to or loss of an IT asset.
risk assessment
-sL
Man-in-the-middle attack
--randomize_hosts -O OS fingerprinting
9. The monetary value expected from the occurrence of a risk on an asset. It is mathematically expressed as single loss expectancy (SLE) = asset value (AV)
Fiber Distributed Data Interface (FDDI)
honeypot
single loss expectancy (SLE)
reverse social engineering
10. A value used to control cryptographic operations - such as decryption -encryption - signature generation - and signature verification.
Hypertext Transfer Protocol (HTTP)
Hypertext Transfer Protocol Secure (HTTPS)
Cryptographic Key
SYN attack
11. Transmission using channels or frequencies outside those normally used for data transfer; often used for error reporting.
impersonation
Vulnerability Scanning
out-of-band signaling
NT LAN Manager (NTLM)
12. Nmap normal output
-oN
Adware
R
Domain Name System (DNS) lookup
13. A point-to-point connection between two endpoints created to exchangedata. Typically a tunnel is either an encrypted connection - or a connection using a protocol in a method for which it was not designed. An encrypted connection forms a point-to-poi
Digital Certificate
Tunnel
Mandatory access control (MAC)
Written Authorization
14. A symmetric key cipher where plaintext bits are combined with a pseudo-random cipher bit stream (keystream) - typically by an exclusive-or (XOR) operation. In a stream cipher the plaintext digits are encrypted one at a time - and the transformation o
Time To Live (TTL)
stream cipher
802.11 i
encapsulation
15. Port 53
DNS
-sR
Cracker
security by obscurity
16. An unknown deficiency in software or some other product that results in a security vulnerability being identified.
Dumpster Diving
security defect
Boot Sector Virus
impersonation
17. A set of rules defined by a system administrator that indicates whether access is allowed or denied to resource objects.
Trusted Computer System Evaluation Criteria (TCSEC)
Bluetooth
Vulnerability Assessment
rule-based access control
18. Hex 04
R
Network Address Translation (NAT)
DNS enumeration
Banner Grabbing
19. A routing protocol developed to be used within a single organization.
Interior Gateway Protocol (IGP)
Wi-Fi Protected Access (WPA)
penetration testing
A procedure for identifying active hosts on a network.
20. A device on a network.
overt channel
SYN attack
node
port scanning
21. A unique hostname that is used to identify resources on the Internet. Domain names start with a root (.) - then add a top level (.com - .gov - or .mil - for example) - and a given name space.
Due Care
network tap
nslookup
Domain Name
22. A type 0 ICMP message used to reply to ECHO requests. Used with ping to verify network layer connectivity between hosts.
ECHO reply
nslookup
Digital Signature
Demilitarized Zone (DMZ)
23. A defined measure of service within a network system
Time Bomb
parameter tampering
quality of service (QoS)
polymorphic virus
24. A means of restricting access to system resources based on the sensitivity (as represented by a label) of the information contained in the system resource and the formal authorization (that is - clearance) of users to access information of such sensi
intrusion prevention system (IPS)
security kernel
Simple Network Management Protocol (SNMP)
Mandatory access control (MAC)
25. An outdated symmetric cipher encryption algorithm - previously U.S. government-approved and used by business and civilian government agencies. DES is no longer considered secure due to the ease with which the entire keyspace can be attempted using mo
404EE
Community String
Data Encryption Standard (DES)
Mantrap
26. Phases of an attack
RID Resource identifier
Reconnaissance - Scanning - Gaining Access - Maintaining Access - Covering Tracks
Wiretapping
spyware
27. A set of rules defined to screen network packets based on source address - destination address - or protocol; these rules determine whether the packet will be forwarded or discarded.
End User Licensing Agreement (EULA)
Filter
shrink-wrap code attacks
Asset
28. The process of using easily accessible DNS records to map a target network's internal hosts.
risk acceptance
DNS enumeration
Echo request
Wi-Fi
29. Port 161/162
SMB
Access Creep
SNMP
Decryption
30. nmap
Accountability
-sR
--randomize_hosts -O OS fingerprinting
Fiber Distributed Data Interface (FDDI)
31. When an authorized person allows (intentionally or unintentionally) someone to pass through a secure door - despite the fact that the intruder does not have a badge.
remote procedure call (RPC)
piggybacking
qualitative analysis
scope creep
32. The art and science of creating a covert message or image within another message - image - audio - or video file.
steganography
Assessment
asynchronous transmission
Time exceeded
33. Evaluation in which testers attempt to penetrate the network.
John the Ripper - LOphtcrack - Ophtcrack - Cain and Abel
HTTP
Level III assessment
Challenge Handshake Authentication Protocol (CHAP)
34. A type of denial-of-service attack where a hacker sends thousands of SYN packets to the target with spoofed IP addresses.
Real application encompassing Trojan
private network address
SYN attack
EDGAR database
35. A network administration command-line tool available for many operating systems for querying the Domain Name System (DNS) to obtain domain name or IP address mappings or any other specific DNS record.
nslookup
Defines legal email marketing
Serial Line Internet Protocol (SLIP)
Echo request
36. Ping Scan
-sP
heuristic scanning
public key
Timestamping
37. A software program for remotely controlling a Microsoft Windows computer system over a network. Generally considered malware.
role-based access control
Algorithm
NetBus
Three-Way (TCP) Handshake
38. The process of using an application to remotely identify open ports on a system (for example - whether systems allow connections through those ports).
DNS enumeration
port scanning
Distributed DoS (DDoS)
Zombie
39. The result of using a private key to encrypt a hash value for identification purposes within a PKI system. The signature can be decoded by the originator's public key - verifying his identity and providing non-repudiation. A valid digital signature g
Digital Signature
gateway
-sW
Anonymizer
40. The means by which a recipient of a message can ensure the identity of the sender and that neither party can deny having sent or received the message. The most common method is through digital certificates.
--randomize_hosts -O OS fingerprinting
security kernel
A R
non-repudiation
41. The act of using numerous electronic serial numbers on a cell phone until a valid number is located.
Competitive Intelligence
social engineering
Tumbling
Back orifice
42. don't ping
Echo request
Videocipher II Satellite Encryption System
Boot Sector Virus
-P0
43. A security objective that ensures a resource can be accessed only by authorized users. This is also the property that sensitive information is not disclosed to unauthorized individuals - entities - or processes.
site survey
404EE
Crossover Error Rate (CER)
Confidentiality
44. Management policy and procedures designed to maintain or restore business operations - including computer operations - possibly at an alternate location - in the event of emergencies - system failures - or disaster.
802.11
Contingency Plan
Fast Ethernet
Web Spider
45. A simple PPP authentication mechanism in which the user name and password are transmitted in clear text to prove identity. PAP compares the user name and password to a table listing authorized users.
TACACS
MAC filtering
route
Password Authentication Protocol (PAP)
46. A denial-of-service technique that uses numerous hosts to perform the attack.
NetBus
Google hacking
Simple Mail Transfer Protocol (SMTP)
Distributed DoS (DDoS)
47. Cracking Tools
pattern matching
John the Ripper - LOphtcrack - Ophtcrack - Cain and Abel
International Organization for Standardization (ISO)
risk assessment
48. Access by information systems (or users) communicating from outside the information system security perimeter.
Black Hat
remote access
single loss expectancy (SLE)
-PM
49. RPC Scan
User Datagram Protocol (UDP)
-sR
Domain Name System (DNS) lookup
rootkit
50. A means of exchanging information from one entity to another using a process that does not provide an attacker the opportunity to reorder - delete - insert - or read information.
secure channel
script kiddie
patch
-PI