SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A social-engineering attack that manipulates the victim into calling the attacker for help.
reverse social engineering
NetBSD
Domain Name System (DNS)
Zombie
2. Microsoft SID 500
Information Technology Security Evaluation Criteria (ITSEC)
Local Administrator
Lightweight Directory Access Protocol (LDAP)
Institute of Electrical and Electronics Engineers (IEEE)
3. A cell phone attack in which the serial number from one cell phone is copied to another in an effort to copy the cell phone.
Wired Equivalent Privacy (WEP)
Internet Assigned Number Authority (IANA)
Cloning
NetBSD
4. An attack in which a hacker steps between two ends of an already-established communication session and uses specialized tools to guess sequence numbers to take over the channel.
signature scanning
session hijacking
passive attack
Replacing numbers in a url to access other files
5. An attack that exploits the common mistake many people make when installing operating systems
SNMP
operating system attack
CNAME record
Google hacking
6. ICMP Timestamp
Address Resolution Protocol (ARP)
-PP
Rijndael
ISO 17799
7. Controls internal to a system designed to resolve vulnerabilities and errors soon after they arise.
Bit Flipping
Corrective Controls
Ciphertext
Virus
8. Actions - devices - procedures - techniques - or other measures intended to reduce the vulnerability of an information system.
Countermeasures
rootkit
Vulnerability
Domain Name System (DNS)
9. A nonnumerical - subjective risk evaluation. Used with qualitative assessment (an evaluation of risk that results in ratings of none - low - medium - and high for the probability.)
Uniform Resource Locator (URL)
Wireless Local Area Network (WLAN)
qualitative analysis
port redirection
10. Hex 14
Blowfish
A
A R
public key
11. Formal description and evaluation of the vulnerabilities in an information system
Vulnerability Assessment
Self Replicating
Wide Area Network (WAN)
-PP
12. A limit on the amount of time or number of iterations or transmissions in computer and network technology a packet can experience before it will be discarded.
Electronic serial number
Cryptography
DNS enumeration
Time To Live (TTL)
13. A method of evaluating the security of a computer system or network by simulating an attack from a malicious source.
Internet Control Message Protocol (ICMP)
impersonation
penetration testing
signature scanning
14. A social-engineering attack using computer resources - such as e-mail or IRC.
self encrypting
honeynet
Computer-Based Attack
shrink-wrap code attacks
15. A method of defining what rights and permissions an entity has to a given resource. In networking - Access Control Lists are commonly associated with firewall and router traffic filtering rules.
Access Control List (ACL)
ECHO reply
Confidentiality
Exploit
16. An attack that is direct in nature - usually where the attacker injects something into - or otherwise alters - the network or system target.
Domain Name System (DNS) lookup
Active Attack
-sT
Simple Network Management Protocol (SNMP)
17. Port 137/138/139
role-based access control
inference attack
SMB
parallel scan & 300 sec timeout & 1.25 sec/probe
18. A group of penetration testers that assess the security of an organization - which is often unaware of the existence of the team or the exact assignment.
Zero Subnet
red team
Annualized Loss Expectancy (ALE)
Back orifice
19. ICMP Type/Code 0-0
Echo Reply
ring topology
Access Creep
Presentation layer
20. Network Scanning
Echo request
encapsulation
stateful packet filtering
A procedure for identifying active hosts on a network.
21. A communications channel that is being used for a purpose it was not intended for - usually to transfer information secretly.
scope creep
Collision Domain
Domain Name
Covert Channel
22. A function that is easy to compute in one direction - yet believed to be difficult to compute in the opposite direction (finding its inverse) without special information - called the 'trapdoor.' Widely used in cryptography.
Trapdoor Function
symmetric algorithm
Access Point (AP)
Authentication Header (AH)
23. Any item of value or worth to an organization - whether physical or virtual.
-sS
Asset
Overwhelm CAM table to convert switch to hub mode
-sW
24. Port 31337
signature scanning
CIA triangle
network operations center (NOC)
Back orifice
25. A network traffic management technique designed to allow applications to specify the route a packet will take to a destination - regardless of what the route tables between the two systems say.
protocol stack
spyware
source routing
human-based social engineering
26. A connectionless - layer 4 transport protocol. UDP is faster than TCP - but offers no reliability. A best effort is made to deliver the data - but no checks and verifications are performed to guarantee delivery. Therefore - UDP is termed a 'connectio
User Datagram Protocol (UDP)
Echo request
RPC-DCOM
segment
27. Formerly Redundant Array of Inexpensive Disks; a technology that provides increased storage functions and reliability through redundancy. This is achieved by combining multiple disk drive components into a logical unit - where data is distributed acr
Traceroute
-sI
Zenmap
Redundant Array of Independent Disks (RAID)
28. An Internet routing protocol used to exchange routing information within an autonomous system.
keylogger
Interior Gateway Protocol (IGP)
Master boot record infector
War Dialing
29. Content Addressable Memory table. Holds all the MAC-address-to-port mappings on a switch.
Information Technology (IT) infrastructure
script kiddie
CAM table
Syslog
30. A virus that plants itself in a system's boot sector and infects the master boot record.
-sA
FreeBSD
Boot Sector Virus
Simple Object Access Protocol (SOAP)
31. Window Scan
DNS
Three-Way (TCP) Handshake
-sW
Third Party
32. An early network application that provides information on users currently logged on to a machine.
reverse lookup; reverse DNS lookup
Wireless Local Area Network (WLAN)
Finger
Internet Protocol Security (IPSec) architecture
33. A symmetric key cipher where plaintext bits are combined with a pseudo-random cipher bit stream (keystream) - typically by an exclusive-or (XOR) operation. In a stream cipher the plaintext digits are encrypted one at a time - and the transformation o
inference attack
Tini
Simple Object Access Protocol (SOAP)
stream cipher
34. A fully operational off-site data-processing facility equipped with hardware and system software to be used in the event of a disaster.
hot site
reconnaissance
Countermeasures
quantitative risk assessment
35. Ping Scan
patch
spyware
Collision Domain
-sP
36. A set of rules defined by a system administrator that indicates whether access is allowed or denied to resource objects.
Transport Layer Security (TLS)
Mantrap
Data Encryption Standard (DES)
rule-based access control
37. A symmetric - block-cipher data-encryption standard that uses a variablelength key that can range from 32 bits to 448 bits.
Blowfish
Address Resolution Protocol (ARP) table
Daisy Chaining
-PI
38. The art and science of creating a covert message or image within another message - image - audio - or video file.
qualitative analysis
False Acceptance Rate (FAR)
steganography
CIA triangle
39. A series of documents and notes on standards used or proposed for use on the Internet; each is identified by a number.
Information Technology (IT) asset criticality
Request for Comments (RFC)
NetBus
-sL
40. When an authorized person allows (intentionally or unintentionally) someone to pass through a secure door - despite the fact that the intruder does not have a badge.
parallel scan & 75 sec timeout & 0.3 sec/probe
risk
piggybacking
audit
41. A hacker who aims to bring down critical infrastructure for a 'cause' and does not worry about the penalties associated with his actions.
physical security
firewall
suicide hacker
port redirection
42. The process of recording activity on a system for monitoring and later review.
User Datagram Protocol (UDP)
Digital Certificate
Auditing
Domain Name System (DNS)
43. The condition of a resource being ready for use and accessible by authorized users.
symmetric algorithm
spam
infrastructure mode
Availability
44. Unauthorized access to information such as a calendar - contact list - e-mails - and text messages on a wireless device through a Bluetooth connection.
Bluesnarfing
-PM
Information Technology (IT) infrastructure
remote access
45. A nonroutable IP address range intended for use only within the confines of a single organization - falling within the predefined ranges of 10.0.0.0 - 172.16-31.0.0 - or 192.168.0.0.
steganography
private network address
Availability
security bulletins
46. A type of denial-of-service attack where a hacker sends thousands of SYN packets to the target with spoofed IP addresses.
network tap
Bluejacking
SYN attack
Network Basic Input/Output System (NetBIOS)
47. A standard for encrypting e-mail - web pages - and other stream-oriented information transmitted over the Internet.
NetBSD
symmetric algorithm
OpenBSD
Transport Layer Security (TLS)
48. A device that provides access between two or more networks. Gateways are typically used to connect dissimilar networks.
gateway
Information Technology (IT) asset valuation
Challenge Handshake Authentication Protocol (CHAP)
White Box Testing
49. A suite of protocols used for securing Internet Protocol (IP) communications by authenticating and encrypting each IP packet of a communication session. This suite includes protocols for establishing mutual authentication between agents at the sessio
SID
Internet Protocol Security (IPSec) architecture
Malicious code
Authorization
50. A storage buffer that transparently stores data so future requests for the same data can be served faster.
spam
MAC filtering
Cache
Wi-Fi