SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A fully operational off-site data-processing facility equipped with hardware and system software to be used in the event of a disaster.
footprinting
Self Replicating
hot site
parallel scan & 75 sec timeout & 0.3 sec/probe
2. A self-replicating - self-propagating - self-contained program that uses networking mechanisms to spread itself.
heuristic scanning
Smurf attack
Network Address Translation (NAT)
Worm
3. A card with a built-in microprocessor and memory used for identification or financial transactions. The card transfers data to and from a central computer when inserted into a reader.
shrink-wrap code attacks
smart card
Real application encompassing Trojan
INFOSEC Assessment Methodology (IAM)
4. A mode of operation in a wireless LAN in which clients send data directly to one another without utilizing a wireless access point (WAP) - much like a point-to-point wired connection.
ad hoc mode
Network Basic Input/Output System (NetBIOS)
forwarding
Denial of Service (DoS)
5. An application that monitors a computer or network to identify - and prevent - malware. AV is usually signature-based - and can take multiple actions on defined malware files/activity.
Secure Multipurpose Mail Extension (S/MIME)
Antivirus (AV) software
Request for Comments (RFC)
War Driving
6. A set of related communications protocols operating together as a group to address communication at some or all of the seven layers of the OSI reference model.
protocol stack
Videocipher II Satellite Encryption System
human-based social engineering
Multipurpose Internet Mail Extensions (MIME)
7. The process of pinging each address within a subnet to map potential targets. Ping sweeps are unreliable and easily detectable - but very fast.
-oA
ping sweep
Institute of Electrical and Electronics Engineers (IEEE)
Digital Certificate
8. Two or more LANs connected by a high-speed line across a large geographical area.
Audit Trail
Web Spider
Virus
Wide Area Network (WAN)
9. An Application layer protocol for managing devices on an IP network.
intranet
XOR Operation
POST
Simple Network Management Protocol (SNMP)
10. Version Detection Scan
POST
File Allocation Table (FAT)
-sV
ISO 17799
11. Sneaky scan timing
serialize scans & 15 sec wait
SAM
Anonymizer
Information Technology (IT) infrastructure
12. A denial-of-service technique that uses numerous hosts to perform the attack.
Distributed DoS (DDoS)
NetBus
Digital Watermarking
Corrective Controls
13. A free and popular version of the Unix operating system.
Computer-Based Attack
FreeBSD
Internet Protocol Security (IPSec) architecture
HTTP
14. Phases of an attack
Network Basic Input/Output System (NetBIOS)
Reconnaissance - Scanning - Gaining Access - Maintaining Access - Covering Tracks
Computer-Based Attack
Tiger Team
15. Security measures - such as a locked door - perimeter fence - or security guard - to prevent or deter physical access to a facility - resource - or information stored on physical media.
physical security
security kernel
Audit Data
Rijndael
16. nmap
Confidentiality
Institute of Electrical and Electronics Engineers (IEEE)
Asynchronous
-p <port ranges>
17. Provides data encryption for IEEE 802.11 wireless networks so data can only be decrypted by the intended recipients.
Competitive Intelligence
honeypot
Overwhelm CAM table to convert switch to hub mode
Wi-Fi Protected Access (WPA)
18. A domain composed of all the systems sharing any given physical transport media. Systems within a collision domain may collide with each other during the transmission of data. Collisions can be managed by CSMA/CD (collision detection) or CSMA/CA (col
gray box testing
Hierarchical File System (HFS)
Collision Domain
replay attack
19. The rate at which a biometric system will incorrectly reject an access attempt by an authorized user.
Copyright
false rejection rate (FRR)
Due Diligence
White Box Testing
20. A point-to-point connection between two endpoints created to exchangedata. Typically a tunnel is either an encrypted connection - or a connection using a protocol in a method for which it was not designed. An encrypted connection forms a point-to-poi
-PS
Back orifice
Tunnel
false rejection rate (FRR)
21. A protocol defining packets that are able to be routed by a router.
U P F
Auditing
halo effect
routed protocol
22. A NAT method in which multiple internal hosts - using private IP addressing - can be mapped through a single public IP address using the session IDs and port numbers. An internal global IP address can support in excess of 65 -000 concurrent TCP and U
S
social engineering
Cookie
Port Address Translation (PAT)
23. Attacks on the actual programming code of an application.
Archive
Domain Name
Application-Level Attacks
Anonymizer
24. A principle in security engineering that attempts to use anonymity and secrecy (of design - implementation - and so on) to provide security; the footprint of the organization - entity - network - or system is kept as small as possible to avoid intere
sheepdip
Authorization
security by obscurity
Media Access Control (MAC)
25. A self-replicating malicious program that attempts installation beneath antivirus software by directly intercepting the interrupt handlers of the operating system to evade detection.
LDAP
Routing Information Protocol (RIP)
Tunneling Virus
risk
26. A VPN tunneling protocol with encryption. PPTP connects two nodes in a VPN by using one TCP port for negotiation and authentication and one IP protocol for data transfer.
Point-to-Point Tunneling Protocol (PPTP)
A
Zero Subnet
Cryptography
27. A mode of operation for a block cipher - with the characteristic that each possible block of plaintext has a defined corresponding ciphertext value - and vice versa
Electronic Code Book (ECB)
script kiddie
Competitive Intelligence
Data Encryption Standard (DES)
28. An inspection of a place where a company or individual proposes to work - to gather the necessary information for a design or risk assessment.
War Driving
spam
Information Technology (IT) infrastructure
site survey
29. Wireless LAN standards created by IEEE. 802.11a runs at up to 54Mbps at 5GHz - 802.11b runs at 11Mbps at 2.4GHz - 802.11g runs at 54Mbps at 2.4GHz - and 802.11n can run upwards of 150MBps.
footprinting
802.11
-P0
Reconnaissance - Scanning - Gaining Access - Maintaining Access - Covering Tracks
30. A virus that plants itself in a system's boot sector and infects the master boot record.
Decryption
secure channel
Boot Sector Virus
security controls
31. The set of all hardware - firmware - and/or software components critical to IT security. Bugs or vulnerabilities occurring inside the TCB might jeopardize the security properties of the entire system.
-PM
honeypot
War Chalking
Trusted Computer Base (TCB)
32. Layer 2 of the OSI reference model. This layer provides reliable transit of data across a physical link. The Data Link layer is concerned with physical addressing - network topology - access to the network medium - error detection - sequential delive
A
intrusion prevention system (IPS)
Data Link layer
passive attack
33. An evaluation consisting of a document review - interviews - and demonstrations - as well as vulnerability scans and hands-on testing.
Certificate Authority (CA)
Level II assessment
private key
hashing algorithm
34. A communications protocol used for browsing the Internet.
segment
Biometrics
Bluejacking
Hypertext Transfer Protocol (HTTP)
35. Nmap normal output
Reconnaissance - Scanning - Gaining Access - Maintaining Access - Covering Tracks
-oN
-sW
Wi-Fi
36. Vulnerability Scanning
Multipurpose Internet Mail Extensions (MIME)
Traceroute
The automated process of proactively identifying vulnerabilities of computing systems present in a network
-oN
37. Steps taken to identify and limit risks to an acceptable or reasonable level of exposure.
Event
Due Diligence
Confidentiality
Point-to-Point Tunneling Protocol (PPTP)
38. A situation in which an IDS or other sensor triggers on an event as an intrusion attempt - when it was actually legitimate traffic.
false negative
-sA
sniffer
Reconnaissance - Scanning - Gaining Access - Maintaining Access - Covering Tracks
39. Provides router-to-router or host-to-network connections over asynchronous and synchronous circuits.
Smurf attack
Point-to-Point Protocol (PPP)
-sR
SID
40. A software program for remotely controlling a Microsoft Windows computer system over a network. Generally considered malware.
Blowfish
Application-Level Attacks
public key
NetBus
41. The process of using an application to remotely identify open ports on a system (for example - whether systems allow connections through those ports).
shrink-wrap code attacks
port scanning
-sF
Assessment
42. An API that provides services related to the OSI model's Session layer - allowing applications on separate computers to communicate over a LAN.
Smurf attack
-p <port ranges>
Telnet
Network Basic Input/Output System (NetBIOS)
43. A query and response protocol widely used for querying databases that store the registered users or assignees of an Internet resource - such as a domain name - an IP address - or an autonomous system.
stateful packet filtering
serialize scans & 0.4 sec wait
Whois
Post Office Protocol 3 (POP3)
44. Software that has advertisements embedded within. Generally displays ads in the form of pop-ups.
Adware
hybrid attack
proxy server
Multipurpose Internet Mail Extensions (MIME)
45. Controls to detect anomalies or undesirable events occurring on a system.
network operations center (NOC)
Block Cipher
impersonation
Detective Controls
46. A unit of information formatted according to specific protocols that allows precise transmittal of data from one network node to another. Also called a datagram or data packet - a packet contains a header (container) and a payload (contents). Any IP
symmetric encryption
Destination Unreachable
Target Of Engagement (TOE)
packet
47. An attacker who breaks into computer systems with malicious intent - without the owner's knowledge or permission.
Defines legal email marketing
Black Hat
Domain Name System (DNS)
Authentication Header (AH)
48. A security protocol used in IEEE 802.11i to replace WEP without the requirement to replace legacy hardware.
Temporal Key Integrity Protocol (TKIP)
Block Cipher
Access Point (AP)
Last In First Out (LIFO)
49. Ping Scan
-sP
port redirection
Daisy Chaining
proxy server
50. An authentication method on point-to-point links - using a three-way handshake and a mutually agreed-upon key.
Challenge Handshake Authentication Protocol (CHAP)
Secure Sockets Layer (SSL)
User Datagram Protocol (UDP)
Virus Hoax