SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A condition that occurs when more data is written to a buffer than it has space to store - and results in data corruption or other system errors. This is usually due to insufficient bounds checking - a bug - or improper configuration in the program c
Transport Layer Security (TLS)
shoulder surfing
Buffer Overflow
personal identification number (PIN)
2. Unauthorized access to information such as a calendar - contact list - e-mails - and text messages on a wireless device through a Bluetooth connection.
Asynchronous
Bluesnarfing
Trapdoor Function
Common Internet File System/Server Message Block
3. The process of using easily accessible DNS records to map a target network's internal hosts.
Community String
Domain Name System (DNS)
DNS enumeration
Lightweight Directory Access Protocol (LDAP)
4. Recording the time - normally in a log file - when an event happens or when information is created or modified.
SNMP
iris scanner
-sL
Timestamping
5. The process of using an application to remotely identify open ports on a system (for example - whether systems allow connections through those ports).
Wireless Local Area Network (WLAN)
Asymmetric
Level I assessment
port scanning
6. Port 23
security incident response team (SIRT)
Telnet
-P0
Pretty Good Privacy (PGP)
7. A type 0 ICMP message used to reply to ECHO requests. Used with ping to verify network layer connectivity between hosts.
Droppers
ECHO reply
404EE
International Organization for Standardization (ISO)
8. A standard that provides best-practice recommendations on information security management for use by those responsible for initiating - implementing - or maintaining Information Security Management Systems (ISMS). Information security is defined with
Destination Unreachable
ISO 17799
Backdoor
Threat
9. Describes practices in production and development that promote access to the end product's source materials.
SSH
open source
Simple Mail Transfer Protocol (SMTP)
Baseline
10. Software or firmware intended to perform an unauthorized process that will have an adverse impact on the confidentiality - integrity - or availability of an information system. A virus - worm - Trojan horse - or other code-based entity that infects a
Malicious code
Cookie
phishing
S
11. Shifting responsibility from one party to another
End User Licensing Agreement (EULA)
Virus Hoax
Replacing numbers in a url to access other files
risk transference
12. A communications channel that is being used for a purpose it was not intended for - usually to transfer information secretly.
steganography
Covert Channel
Fraud and related activity in connection with computers
Domain Name
13. A software license agreement; a contract between the 'licensor' and purchaser establishing the right to use the software.
Mandatory access control (MAC)
End User Licensing Agreement (EULA)
risk avoidance
Administratively Prohibited
14. Any item of value or worth to an organization - whether physical or virtual.
HTTP tunneling
-sL
Zenmap
Asset
15. A hacker who aims to bring down critical infrastructure for a 'cause' and does not worry about the penalties associated with his actions.
Hacks without permission
suicide hacker
impersonation
Tunneling
16. An inspection of a place where a company or individual proposes to work - to gather the necessary information for a design or risk assessment.
site survey
Authentication Header (AH)
Internal access to the network
Malicious code
17. Used to find the domain name associated with an IP address; the opposite of a DNS lookup.
Droppers
Kerberos
replay attack
reverse lookup; reverse DNS lookup
18. A free and popular version of the Unix operating system.
Level II assessment
Active Fingerprinting
asynchronous transmission
FreeBSD
19. A malicious computer program with self-replication capabilities that attaches to another file and moves with the host from one computer to another.
risk assessment
ping sweep
Virus
encryption
20. A value used to control cryptographic operations - such as decryption -encryption - signature generation - and signature verification.
Interior Gateway Protocol (IGP)
nslookup
Cryptographic Key
U P F
21. An organization composed of engineers - scientists - and students who issue standards related to electrical - electronic - and computer engineering.
-P0
Institute of Electrical and Electronics Engineers (IEEE)
private network address
Daisy Chaining
22. A network traffic management technique designed to allow applications to specify the route a packet will take to a destination - regardless of what the route tables between the two systems say.
source routing
CIA triangle
Last In First Out (LIFO)
Access Point (AP)
23. A type of DNS transfer - where all records from an SOA are transmitted to the requestor. Zone transfers have two options: full (opcode AXFR) and incremental (IXFR).
serialize scans & 15 sec wait
ping sweep
Zone transfer
penetration testing
24. ICMP Timestamp
-sX
-PP
Annualized Loss Expectancy (ALE)
-PS
25. A text file stored within a browser by a web server that maintains information about the connection. Cookies are used to store information to maintain a unique but consistent surfing experience - but can also contain authentication parameters. Cookie
Domain Name System (DNS) cache poisoning
-PI
Cookie
-sU
26. Formerly Redundant Array of Inexpensive Disks; a technology that provides increased storage functions and reliability through redundancy. This is achieved by combining multiple disk drive components into a logical unit - where data is distributed acr
encapsulation
Methodology
Redundant Array of Independent Disks (RAID)
iris scanner
27. A communications protocol used for browsing the Internet.
Hypertext Transfer Protocol (HTTP)
Cookie
packet
A R
28. A business - government agency - or educational institution that provides access to the Internet.
Level III assessment
Baseline
SYN flood attack
Internet service provider (ISP)
29. Version Detection Scan
queue
separation of duties
Computer Emergency Response Team (CERT)
-sV
30. A brand name of analog scrambling and de-scrambling equipment for cable and satellite television - invented primarily to keep consumer Television receive-only (TVRO) satellite equipment from receiving TV programming except on a subscription basis.
Malware
INFOSEC Assessment Methodology (IAM)
Videocipher II Satellite Encryption System
War Driving
31. Directing a protocol from one port to another.
-sA
encryption
Defines legal email marketing
port redirection
32. The security property that data is not modified in an unauthorized and undetected manner. Also - the principle and measures taken to ensure that data received is in the exact same condition and state as when it was originally transmitted.
Electronic Code Book (ECB)
integrity
Replacing numbers in a url to access other files
serialize scans & 15 sec wait
33. An application that monitors a computer or network to identify - and prevent - malware. AV is usually signature-based - and can take multiple actions on defined malware files/activity.
Antivirus (AV) software
Service Set Identifier (SSID)
segment
No previous knowledge of the network
34. Xmas Tree scan
Copyright
separation of duties
-sX
A series of messages sent by someone attempting to break into a computer to learn about the computer's network services.
35. A step-by-step method of solving a problem. In computing security - an algorithm is a set of mathematical rules (logic) for the process of encryption and decryption
Algorithm
Self Replicating
Boot Sector Virus
Availability
36. Text or data in its encrypted form; the result of plaintext being input into a cryptographic algorithm.
Exploit
Tunneling
Ciphertext
Console Port
37. An international organization composed of national standards bodies from over 75 countries. Developed the OSI reference model.
International Organization for Standardization (ISO)
payload
Application Layer
net use \[target ip]IPC$ '' /user:''
38. A security objective that ensures a resource can be accessed only by authorized users. This is also the property that sensitive information is not disclosed to unauthorized individuals - entities - or processes.
proxy server
Confidentiality
honeynet
human-based social engineering
39. A situation in which an IDS or other sensor triggers on an event as an intrusion attempt - when it was actually legitimate traffic.
false negative
Institute of Electrical and Electronics Engineers (IEEE)
Secure Sockets Layer (SSL)
Real application encompassing Trojan
40. A NAT method in which multiple internal hosts - using private IP addressing - can be mapped through a single public IP address using the session IDs and port numbers. An internal global IP address can support in excess of 65 -000 concurrent TCP and U
Fast Ethernet
Port Address Translation (PAT)
inference attack
Third Party
41. Paranoid scan timing
serial scan & 300 sec wait
Presentation layer
File Transfer Protocol (FTP)
Discretionary Access Control (DAC)
42. An environmentally conditioned workspace partially equipped with IT and telecommunications equipment to support relocated IT operations in the event of a significant disruption.
Warm Site
Daemon
-sF
footprinting
43. Window Scan
-sV
-sW
Network Address Translation (NAT)
Master boot record infector
44. A security protocol for wireless local area networks defined in the 802.11b standard; intended to provide the same level of security as a wired LAN. WEP is not considered strong security - although it does authenticate clients to access points - encr
forwarding
session splicing
Wired Equivalent Privacy (WEP)
Destination Unreachable
45. Any kind of connection that allows you to see all traffic passing by. Generally used in reference to a NIDS (network-based IDS) to monitor all traffic.
hash
gray box testing
network tap
Man-in-the-middle attack
46. Injecting traffic into the network to identify the operating system of a device.
-PP
gap analysis
Active Fingerprinting
spoofing
47. Hex 14
SAM
POP 3
payload
A R
48. Weakness in an information system - system security procedures - internal controls - or implementation that could be exploited or triggered by a threat source.
Macro virus
personal identification number (PIN)
Vulnerability
role-based access control
49. Originally an extension of PPP - this is a protocol for authentication used within wireless networks. Works with multiple authentication measures.
Extensible Authentication Protocol (EAP)
Request for Comments (RFC)
Daisy Chaining
intranet
50. A method for detecting malicious code on a computer where the files are compared to signatures of known viruses stored in a database.
Presentation layer
signature scanning
Adware
Archive