SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Idlescan
Droppers
-sI
ISO 17799
Hacks with permission
2. Used to find the domain name associated with an IP address; the opposite of a DNS lookup.
reverse lookup; reverse DNS lookup
integrity
Console Port
S
3. The concept of having more than one person required to complete a task
nslookup
separation of duties
-PP
Hypertext Transfer Protocol (HTTP)
4. Calculations of two components of risk: R - the magnitude of the potential loss (L) - and the probability - p - that the loss will occur.
Electronic serial number
quantitative risk assessment
ad hoc mode
replay attack
5. Hex 14
Active Fingerprinting
A R
open source
Wireless Local Area Network (WLAN)
6. An Internet Protocol Security (IPSec) header used to verify that the contents of a packet have not been modified while the packet was in transit.
null session
Biometrics
Authentication Header (AH)
Level III assessment
7. Evaluation in which testers attempt to penetrate the network.
risk avoidance
network tap
Level III assessment
Tumbling
8. An API that provides services related to the OSI model's Session layer - allowing applications on separate computers to communicate over a LAN.
Tumbling
-PS
Copyright
Network Basic Input/Output System (NetBIOS)
9. Text or data in its encrypted form; the result of plaintext being input into a cryptographic algorithm.
Bluetooth
Internet service provider (ISP)
risk acceptance
Ciphertext
10. A group of penetration testers that assess the security of an organization - which is often unaware of the existence of the team or the exact assignment.
ECHO reply
Baseline
red team
Packet Internet Groper (ping)
11. Unauthorized access to information such as a calendar - contact list - e-mails - and text messages on a wireless device through a Bluetooth connection.
Access Control List (ACL)
Bluesnarfing
Three-Way (TCP) Handshake
intrusion prevention system (IPS)
12. Injecting traffic into the network to identify the operating system of a device.
Active Fingerprinting
Bluejacking
Authentication - Authorization - and Accounting (AAA)
role-based access control
13. Port 88
Kerberos
Acknowledgment (ACK)
Availability
A R
14. A free - open source version of the Berkeley Software Distribution of Unix - often used in embedded systems.
rootkit
steganography
Electronic serial number
NetBSD
15. A number assigned during TCP startup sessions that tracks how much information has been moved. This number is used by hackers when hijacking sessions.
stateful packet filtering
Collision
NetBus
initial sequence number (ISN)
16. Polite scan timing
risk transference
Address Resolution Protocol (ARP)
serialize scans & 0.4 sec wait
MD5
17. Baseband LAN specification developed by Xerox Corporation - Intel - and Digital Equipment Corporation. One of the least expensive - most widely deployed networking standards; uses the CSMA/CD method of media access control.
SNMP
Threat
scope creep
Ethernet
18. The rate at which a biometric system will incorrectly reject an access attempt by an authorized user.
Whois
false rejection rate (FRR)
Open System Interconnection (OSI) Reference Model
Warm Site
19. In penetration testing - enumeration is the act of querying a device or network segment thoroughly and systematically for information.
shoulder surfing
enumeration
--randomize_hosts -O OS fingerprinting
Database
20. Directing a protocol from one port to another.
smart card
Vulnerability Scanning
Wiretapping
port redirection
21. An informed decision to accept the potential for damage to or loss of an IT asset.
null session
Written Authorization
risk acceptance
passive attack
22. TCP connect() scan
Information Technology (IT) asset valuation
-sT
Crossover Error Rate (CER)
End User Licensing Agreement (EULA)
23. Self-contained network with a limited number of participants who extend limited trust to one another in order to accomplish an agreed-upon goal.
Virus Hoax
intranet
War Driving
Cracker
24. A systematic process for the assessment of security vulnerabilities.
INFOSEC Assessment Methodology (IAM)
false negative
security by obscurity
private network address
25. A software license agreement; a contract between the 'licensor' and purchaser establishing the right to use the software.
Bluejacking
End User Licensing Agreement (EULA)
network operations center (NOC)
Kerberos
26. A method of permitting only MAC addresses in a preapproved list network access. Addresses not matching are blocked.
Packet Internet Groper (ping)
Self Replicating
MAC filtering
Event
27. A value used to control cryptographic operations - such as decryption -encryption - signature generation - and signature verification.
open source
Cryptographic Key
Secure Sockets Layer (SSL)
Open System Interconnection (OSI) Reference Model
28. An authentication method on point-to-point links - using a three-way handshake and a mutually agreed-upon key.
phishing
War Chalking
forwarding
Challenge Handshake Authentication Protocol (CHAP)
29. A network system of servers that translates numeric Internet Protocol (IP) addresses into human-friendly - hierarchical Internet addresses - and vice versa.
hash
Countermeasures
Domain Name System (DNS)
sheepdip
30. A communications path - such as the Internet - authorized for data transmission within a computer system or network.
Trapdoor Function
--randomize_hosts -O OS fingerprinting
GET
overt channel
31. CAN-SPAM
POP 3
ISO 17799
encryption
Defines legal email marketing
32. A computer security expert who performs security audits and penetration tests against systems or network segments - with the owner's full knowledge and permission - in an effort to increase security.
firewalking
Ethical Hacker
Backdoor
Data Link layer
33. Defined in RFC 826 - ARP is a protocol used to map a known IP address to a physical (MAC) address.
Port Address Translation (PAT)
nslookup
Address Resolution Protocol (ARP)
Black Hat
34. A function that is easy to compute in one direction - yet believed to be difficult to compute in the opposite direction (finding its inverse) without special information - called the 'trapdoor.' Widely used in cryptography.
Decryption
session hijacking
XOR Operation
Trapdoor Function
35. Conversion of plaintext to ciphertext through the use of a cryptographic algorithm.
Secure Multipurpose Mail Extension (S/MIME)
Anonymizer
encryption
RPC-DCOM
36. An Application layer protocol used primarily by Microsoft Windows to provide shared access to printers - files - and serial ports. It also provides an authenticated interprocess communication mechanism.
Common Internet File System/Server Message Block
Network Address Translation (NAT)
encapsulation
smart card
37. Set of tools (applications or code) that enables administrator-level accessto a computer or computer network and is designed to obscure the fact that the system has been compromised. Rootkits are dangerous malware entities that provide administrator
Timestamping
Cookie
rootkit
public key
38. nmap
Ciphertext
Discretionary Access Control (DAC)
gap analysis
--randomize_hosts -O OS fingerprinting
39. Vulnerability Scanning
MAC filtering
The automated process of proactively identifying vulnerabilities of computing systems present in a network
SNMP
Wireless Local Area Network (WLAN)
40. A security protocol for wireless local area networks defined in the 802.11b standard; intended to provide the same level of security as a wired LAN. WEP is not considered strong security - although it does authenticate clients to access points - encr
Wired Equivalent Privacy (WEP)
Kerberos
nslookup
Daisy Chaining
41. A system used by the Securities and Exchange Commission (SEC) for companies and businesses to transmit required filings and information. The EDGAR database performs automated collection - validation - indexing - acceptance - and forwarding of submiss
Interior Gateway Protocol (IGP)
War Chalking
Overwhelm CAM table to convert switch to hub mode
EDGAR database
42. A class of algorithms for cryptography that use the same cryptographic key for both decryption and encryption.
personal identification number (PIN)
War Driving
CNAME record
symmetric algorithm
43. Layer 7 of the OSI reference model. The Application layer provides services to applications - which allow them access to the network. Protocols such as FTP and SMTP reside here.
Information Technology Security Evaluation Criteria (ITSEC)
Application Layer
phishing
Exposure Factor
44. A NAT method in which multiple internal hosts - using private IP addressing - can be mapped through a single public IP address using the session IDs and port numbers. An internal global IP address can support in excess of 65 -000 concurrent TCP and U
protocol stack
risk assessment
Port Address Translation (PAT)
Daisy Chaining
45. A configuration of a network card that makes the card pass all traffic it receives to the central processing unit rather than just frames addressed to it
SMB
promiscuous mode
Zero Subnet
Competitive Intelligence
46. Looking over an authorized user's shoulder in order to steal information (such as authentication information).
Availability
DNS enumeration
RPC-DCOM
shoulder surfing
47. A protocol that uses a private key to encrypt data before transmitting confidential documents over the Internet; widely used on e-commerce - banking - and other sites requiring privacy.
Secure Sockets Layer (SSL)
Interior Gateway Protocol (IGP)
Extensible Authentication Protocol (EAP)
Third Party
48. Physical socket provided on routers and switches for cable connections between a computer and the router/switch. This connection enables the computer to configure - query - and troubleshoot the router/switch by use of a terminal emulator and a comman
Console Port
White Box Testing
public key infrastructure (PKI)
Trojan Horse
49. The organization that governs the Internet's top-level domains - IP address allocation - and port number assignments.
Internet Assigned Number Authority (IANA)
Virus
-sU
Application Layer
50. Sneaky scan timing
serialize scans & 15 sec wait
-b
Real application encompassing Trojan
Timestamping
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests