SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Directory Transversal
Finding a directory listing and gaining access to a parent or root file for access to other files
encapsulation
encryption
penetration testing
2. nmap all output
-oA
public key infrastructure (PKI)
Time Bomb
Possession of access devices
3. An organized collection of data.
Database
Request for Comments (RFC)
Wi-Fi Protected Access (WPA)
Cryptography
4. A firewall evasion technique whereby packets are wrapped in HTTP - as a covert channel to the target.
Computer-Based Attack
HTTP tunneling
network operations center (NOC)
Adware
5. A fully qualified domain name consists of a host and domain name - including a top-level domain such as .com - .net - .mil - .edu -and so on.
serial scan & 300 sec wait
fully qualified domain name (FQDN)
smart card
parallel scan
6. A command used in HTTP and FTP to retrieve a file from a server.
-oG
NetBus
A R
GET
7. A measurable - physical characteristic used to recognize the identity - or verify the claimed identity - of an applicant. Facial images - fingerprints - and handwriting samples are all examples of biometrics.
False Acceptance Rate (FAR)
Biometrics
Discretionary Access Control (DAC)
ping sweep
8. An inspection of a place where a company or individual proposes to work - to gather the necessary information for a design or risk assessment.
risk
Domain Name System (DNS) lookup
route
site survey
9. The set of all hardware - firmware - and/or software components critical to IT security. Bugs or vulnerabilities occurring inside the TCB might jeopardize the security properties of the entire system.
Cryptography
Trusted Computer Base (TCB)
Defense in Depth
secure channel
10. Port 88
Web Spider
risk transference
Kerberos
Antivirus (AV) software
11. A security tool designed to protect a system or network against attacks by comparing traffic patterns against a list of both known attack signatures and general characteristics of how attacks may be carried out. Threats are rated and protective measu
secure channel
National Security Agency
Eavesdropping
intrusion prevention system (IPS)
12. Any network incident that prompts some kind of log entry or other notification.
Event
spyware
Algorithm
Cloning
13. SYN Ping
End User Licensing Agreement (EULA)
public key infrastructure (PKI)
A S
-PS
14. Cracking Tools
John the Ripper - LOphtcrack - Ophtcrack - Cain and Abel
Demilitarized Zone (DMZ)
Authorization
User Datagram Protocol (UDP)
15. A secret - typically consisting of only decimal digits - that a claimant memorizes and uses to authenticate his identity
personal identification number (PIN)
Timestamping
End User Licensing Agreement (EULA)
physical security
16. An environmentally conditioned workspace partially equipped with IT and telecommunications equipment to support relocated IT operations in the event of a significant disruption.
rootkit
Warm Site
Information Technology (IT) asset criticality
hacktivism
17. A systematic process for the assessment of security vulnerabilities.
Competitive Intelligence
INFOSEC Assessment Methodology (IAM)
--randomize_hosts -O OS fingerprinting
forwarding
18. A unique hostname that is used to identify resources on the Internet. Domain names start with a root (.) - then add a top level (.com - .gov - or .mil - for example) - and a given name space.
Crossover Error Rate (CER)
The automated process of proactively identifying vulnerabilities of computing systems present in a network
NOP
Domain Name
19. The process of pinging each address within a subnet to map potential targets. Ping sweeps are unreliable and easily detectable - but very fast.
Simple Object Access Protocol (SOAP)
Application-Level Attacks
ping sweep
ad hoc mode
20. Sneaky scan timing
Baseline
logic bomb
serialize scans & 15 sec wait
SNMP
21. Access by information systems (or users) communicating from outside the information system security perimeter.
Internet service provider (ISP)
false negative
Domain Name System (DNS) lookup
remote access
22. Directing a protocol from one port to another.
Level III assessment
International Organization for Standardization (ISO)
SYN flood attack
port redirection
23. The directory service created by Microsoft for use on itsnetworks. Provides a variety of network services using Lightweight Directory Access Protocol (LDAP) - Kerberos-based authentication - and single sign-on for user access to network-based resourc
War Chalking
POP 3
Written Authorization
Active Directory (AD)
24. Port 137/138/139
SMB
Asynchronous
Request for Comments (RFC)
initial sequence number (ISN)
25. A non-self-replicating program that appears to have a useful purpose - but in reality has a different - malicious purpose.
Administratively Prohibited
Trojan Horse
The automated process of proactively identifying vulnerabilities of computing systems present in a network
Simple Mail Transfer Protocol (SMTP)
26. All measures and techniques taken to gather information about an intended target. Footprinting can be passive or active.
-sA
footprinting
risk acceptance
SSH
27. An industry standard protocol used for accessing and managing information within a directory service; an application protocol for querying and modifying data using directory services running over TCP/IP.
Lightweight Directory Access Protocol (LDAP)
pattern matching
Client
gray hat
28. A software or hardware defect that often results in system vulnerabilities.
fully qualified domain name (FQDN)
payload
Competitive Intelligence
Bug
29. A nonnumerical - subjective risk evaluation. Used with qualitative assessment (an evaluation of risk that results in ratings of none - low - medium - and high for the probability.)
Event
qualitative analysis
Hacks with permission
service level agreements (SLAs)
30. A communications protocol used for browsing the Internet.
Routing Information Protocol (RIP)
Target Of Engagement (TOE)
Audit Trail
Hypertext Transfer Protocol (HTTP)
31. A self-replicating malicious program that attempts installation beneath antivirus software by directly intercepting the interrupt handlers of the operating system to evade detection.
Wi-Fi Protected Access (WPA)
Tunneling Virus
open source
segment
32. A utility that sends an ICMP Echo message to determine if a specific IP address is accessible; if the message receives a reply - the address is reachable.
Authentication - Authorization - and Accounting (AAA)
promiscuous mode
Packet Internet Groper (ping)
audit
33. The result of using a private key to encrypt a hash value for identification purposes within a PKI system. The signature can be decoded by the originator's public key - verifying his identity and providing non-repudiation. A valid digital signature g
Digital Signature
Authentication
Brute-Force Password Attack
SAM
34. Attacks that take advantage of the built-in code and scripts most off-the-shelf applications come with.
shrink-wrap code attacks
Kerberos
Archive
Decryption
35. The concept of having more than one person required to complete a task
Third Party
separation of duties
Virtual Local Area Network (VLAN)
OpenBSD
36. Chronological record of system activities to enable the reconstruction and examination of the sequence of events and changes in an event.
ad hoc mode
Hacks with permission
Audit Data
private key
37. A security tool designed to protect a system or network against attacks by comparing traffic patterns against a list of both known attack signatures and general characteristics of how attacks may be carried out. Threats are rated and reported.
CIA triangle
ad hoc mode
intrusion detection system (IDS)
International Organization for Standardization (ISO)
38. A network architecture framework developed by ISO that describes the communications process between two systems across the Internet in seven distinct layers.
Third Party
Smurf attack
Open System Interconnection (OSI) Reference Model
Internal access to the network
39. A networking configuration where all nodes are connected in a circle with no terminated ends on the cable.
ring topology
Simple Object Access Protocol (SOAP)
Secure Multipurpose Mail Extension (S/MIME)
Dumpster Diving
40. PI and PT Ping
network access server
-PB
Access Creep
Dumpster Diving
41. A denial-of-service technique that uses numerous hosts to perform the attack.
Hypertext Transfer Protocol (HTTP)
flood
Distributed DoS (DDoS)
-sA
42. An unknown deficiency in software or some other product that results in a security vulnerability being identified.
queue
out-of-band signaling
Confidentiality
security defect
43. Port 23
Telnet
Extensible Authentication Protocol (EAP)
honeynet
Replacing numbers in a url to access other files
44. A security protocol for wireless local area networks defined in the 802.11b standard; intended to provide the same level of security as a wired LAN. WEP is not considered strong security - although it does authenticate clients to access points - encr
route
network interface card (NIC)
risk avoidance
Wired Equivalent Privacy (WEP)
45. A fully operational off-site data-processing facility equipped with hardware and system software to be used in the event of a disaster.
SID
Challenge Handshake Authentication Protocol (CHAP)
Black Box Testing
hot site
46. A query and response protocol widely used for querying databases that store the registered users or assignees of an Internet resource - such as a domain name - an IP address - or an autonomous system.
-b
Collision Domain
Whois
Due Diligence
47. Insane scan timing
symmetric encryption
Authentication
Internet service provider (ISP)
parallel scan & 75 sec timeout & 0.3 sec/probe
48. The transmission of digital signals without precise clocking or synchronization.
asynchronous transmission
-sT
Pretty Good Privacy (PGP)
script kiddie
49. Activities to determine the extent to which a security control is implemented correctly - operating as intended - and producing the desired outcome with respect to meeting the security requirements for the system.
Assessment
Computer Emergency Response Team (CERT)
logic bomb
packet filtering
50. A nontechnical method of hacking. Social engineering is the art of manipulating people - whether in person (human-based) or via computing methods (computer-based) - into providing sensitive information.
Tumbling
remote procedure call (RPC)
social engineering
Asymmetric Algorithm