SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A hacker who aims to bring down critical infrastructure for a 'cause' and does not worry about the penalties associated with his actions.
enumeration
suicide hacker
SID
public key infrastructure (PKI)
2. A unit of information formatted according to specific protocols that allows precise transmittal of data from one network node to another. Also called a datagram or data packet - a packet contains a header (container) and a payload (contents). Any IP
Daemon
XOR Operation
packet
enumeration
3. A connection-oriented - layer 4 protocol for transporting data over network segments. TCP is considered reliable because it guarantees delivery and the proper reordering of transmitted packets. This protocol is used for most long-haul traffic on the
War Driving
Transmission Control Protocol (TCP)
Authorization
Extensible Authentication Protocol (EAP)
4. The act of checking some sequence of tokens for the presence of the constituents of some pattern.
symmetric algorithm
pattern matching
-sL
spam
5. Normal scan timing
-sF
halo effect
parallel scan & 300 sec timeout & 1.25 sec/probe
parallel scan
6. An adapter that provides the physical connection to send and receive data between the computer and the network media.
The automated process of proactively identifying vulnerabilities of computing systems present in a network
MD5
Digital Watermarking
network interface card (NIC)
7. A physical security attack where the attacker sifts through garbage and recycle bins for information that may be useful on current and future attacks
proxy server
open source
Daisy Chaining
Dumpster Diving
8. The act of secretly listening to the private conversations of others without their consent. This can also be done over telephone lines (wiretapping) - e-mail - instant messaging - and other methods of communication considered private
Eavesdropping
Wired Equivalent Privacy (WEP)
Tunneling Virus
Open System Interconnection (OSI) Reference Model
9. The means by which a recipient of a message can ensure the identity of the sender and that neither party can deny having sent or received the message. The most common method is through digital certificates.
Console Port
Black Hat
non-repudiation
Ethernet
10. 18 U.S.C. 1029
public key
Possession of access devices
Collision
reverse social engineering
11. Shifting responsibility from one party to another
fragmentation
Tunneling Virus
risk transference
payload
12. A Windows-based GUI version of nmap.
Certificate
Zenmap
-sI
Hacks with permission
13. The process of using easily accessible DNS records to map a target network's internal hosts.
Denial of Service (DoS)
encryption
Level I assessment
DNS enumeration
14. Security identifier. The method by which Windows identifies user - group - and computer accounts for rights and permissions.
Trapdoor Function
White Box Testing
SID
asynchronous transmission
15. Nmap grepable output
Malicious code
Simple Mail Transfer Protocol (SMTP)
-oG
risk assessment
16. A type 0 ICMP message used to reply to ECHO requests. Used with ping to verify network layer connectivity between hosts.
ECHO reply
sniffer
Simple Mail Transfer Protocol (SMTP)
Target Of Engagement (TOE)
17. The level of importance assigned to an IT asset
Worm
Trusted Computer Base (TCB)
Information Technology (IT) asset criticality
role-based access control
18. A brand name of analog scrambling and de-scrambling equipment for cable and satellite television - invented primarily to keep consumer Television receive-only (TVRO) satellite equipment from receiving TV programming except on a subscription basis.
Authentication Header (AH)
Community String
symmetric algorithm
Videocipher II Satellite Encryption System
19. Nmap normal output
-oN
net use \[target ip]IPC$ '' /user:''
-PB
encryption
20. Actions - devices - procedures - techniques - or other measures intended to reduce the vulnerability of an information system.
-PS
Countermeasures
smart card
RxBoot
21. A decision to reduce the potential for damage to or loss of an IT asset by taking some type of action
Cracker
risk avoidance
-PB
Simple Network Management Protocol (SNMP)
22. Software that has advertisements embedded within. Generally displays ads in the form of pop-ups.
Minimum acceptable level of risk
Transport Layer Security (TLS)
-oX
Adware
23. An e-mail protection method using a secret message or image that can be referenced on any official communication with the site; if an e-mail is received without the image or message - the recipient knows it is not legitimate.
shrink-wrap code attacks
Sign in Seal
Competitive Intelligence
Droppers
24. A documented process for a procedure designed to be consistent - repeatable - and accountable.
-sR
Common Internet File System/Server Message Block
audit
Methodology
25. An Application layer protocol for managing devices on an IP network.
Simple Network Management Protocol (SNMP)
Secure Multipurpose Mail Extension (S/MIME)
Unicode
Auditing
26. A self-replicating malicious program that attempts installation beneath antivirus software by directly intercepting the interrupt handlers of the operating system to evade detection.
non-repudiation
SAM
Tunneling Virus
A series of messages sent by someone attempting to break into a computer to learn about the computer's network services.
27. A virus designed to infect the master boot record.
Master boot record infector
-sU
Smurf attack
secure channel
28. A configuration of a network card that makes the card pass all traffic it receives to the central processing unit rather than just frames addressed to it
Asymmetric Algorithm
promiscuous mode
-PP
honeynet
29. A string used for authentication in SNMP. The public community string is used for read-only searches - whereas the private community string is used for read/write. Community strings are transmitted in clear text in SNMPv1. SNMPv3 provides encryption
Buffer Overflow
Internet Protocol (IP)
Community String
Electronic Code Book (ECB)
30. A symmetric key cipher where plaintext bits are combined with a pseudo-random cipher bit stream (keystream) - typically by an exclusive-or (XOR) operation. In a stream cipher the plaintext digits are encrypted one at a time - and the transformation o
Banner Grabbing
stream cipher
Third Party
private key
31. The act of dialing all numbers within an organization to discover open modems.
Authentication - Authorization - and Accounting (AAA)
-oA
War Dialing
iris scanner
32. A collection of historical records or the place where they are kept. In computing - an archive generally refers to backup copies of logs and/or data.
Archive
Detective Controls
smart card
CNAME record
33. In a classful IPv4 subnet - this is the network number with all binary 0s in the subnet part of the number. When written in decimal - the zero subnet has the same number as the classful network number.
Asymmetric Algorithm
Zero Subnet
Packet Internet Groper (ping)
passive attack
34. A defined measure of service within a network system
-sT
quality of service (QoS)
Redundant Array of Independent Disks (RAID)
spam
35. An HTTP command to transmit text to a web server for processing. The opposite of an HTTP GET.
War Chalking
local area network (LAN)
POST
Asset
36. A security objective that ensures a resource can be accessed only by authorized users. This is also the property that sensitive information is not disclosed to unauthorized individuals - entities - or processes.
Information Technology Security Evaluation Criteria (ITSEC)
Trojan Horse
quality of service (QoS)
Confidentiality
37. Recording the time - normally in a log file - when an event happens or when information is created or modified.
Telnet
Timestamping
passive attack
Electronic Code Book (ECB)
38. An attack in which a hacker steps between two ends of an already-established communication session and uses specialized tools to guess sequence numbers to take over the channel.
No previous knowledge of the network
Acceptable Use Policy (AUP)
session hijacking
penetration testing
39. ICMP Type/Code 11
Tini
Time exceeded
pattern matching
quality of service (QoS)
40. The subjective - potential percentage of loss to a specific asset if a specific threat is realized. The exposure factor (EF) is a subjective value the person assessing risk must define.
False Acceptance Rate (FAR)
Whois
Exposure Factor
Asset
41. A security protocol used in IEEE 802.11i to replace WEP without the requirement to replace legacy hardware.
Temporal Key Integrity Protocol (TKIP)
Acknowledgment (ACK)
SNMP
-sU
42. The security property that data is not modified in an unauthorized and undetected manner. Also - the principle and measures taken to ensure that data received is in the exact same condition and state as when it was originally transmitted.
gateway
integrity
NT LAN Manager (NTLM)
-sI
43. A non-self-replicating program that appears to have a useful purpose - but in reality has a different - malicious purpose.
Trojan Horse
Finger
A series of messages sent by someone attempting to break into a computer to learn about the computer's network services.
Competitive Intelligence
44. Network Scanning
site survey
SYN attack
A procedure for identifying active hosts on a network.
keylogger
45. A systematic process for the assessment of security vulnerabilities.
INFOSEC Assessment Methodology (IAM)
service level agreements (SLAs)
Algorithm
reverse social engineering
46. The process of attaching a particular protocol header and trailer to a unit of data before transmission on the network. Occurs at layer 2 of the OSI reference model.
Service Set Identifier (SSID)
packet
encapsulation
Application Layer
47. An attack in which the hacker can derive information from the ciphertext without actually decoding it. Sensitive information can be considered compromised if an adversary can infer its real value with a high level of confidence.
inference attack
Local Administrator
Interior Gateway Protocol (IGP)
Audit Data
48. A simple PPP authentication mechanism in which the user name and password are transmitted in clear text to prove identity. PAP compares the user name and password to a table listing authorized users.
flood
keylogger
Password Authentication Protocol (PAP)
spoofing
49. Hex 04
gap analysis
R
Cloning
Droppers
50. The transmission of digital signals without precise clocking or synchronization.
hash
steganography
Finding a directory listing and gaining access to a parent or root file for access to other files
asynchronous transmission
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests