SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A connection-oriented - layer 4 protocol for transporting data over network segments. TCP is considered reliable because it guarantees delivery and the proper reordering of transmitted packets. This protocol is used for most long-haul traffic on the
Transmission Control Protocol (TCP)
identity theft
Buffer
Challenge Handshake Authentication Protocol (CHAP)
2. A communications channel that is being used for a purpose it was not intended for - usually to transfer information secretly.
Bug
Covert Channel
segment
-b
3. A background process found in Unix - Linux - Solaris - and other Unix-based operating systems.
gray hat
Kerberos
Distributed DoS (DDoS)
Daemon
4. Shifting responsibility from one party to another
Routing Protocol
Wi-Fi Protected Access (WPA)
risk transference
Zombie
5. The result of using a private key to encrypt a hash value for identification purposes within a PKI system. The signature can be decoded by the originator's public key - verifying his identity and providing non-repudiation. A valid digital signature g
War Dialing
SSH
Digital Signature
Web Spider
6. Software or hardware components that restrict access between a protected network and the Internet - or between other sets of networks - to block unwanted use or attacks.
Level I assessment
firewall
Crossover Error Rate (CER)
-PS
7. Activities to determine the extent to which a security control is implemented correctly - operating as intended - and producing the desired outcome with respect to meeting the security requirements for the system.
hot site
Information Technology (IT) security architecture and framework
Covert Channel
Assessment
8. Microsoft SID 500
spoofing
Request for Comments (RFC)
Local Administrator
Lightweight Directory Access Protocol (LDAP)
9. 18 U.S.C. 1030
Fraud and related activity in connection with computers
Exposure Factor
Digital Signature
Third Party
10. Also known as a digital certificate - this is an electronic file used to verify a user's identity - providing non-repudiation throughout the system It is also a set of data that uniquely identifies an entity. Certificates contain the entity's public
CAM table
Wi-Fi
Multipartite virus
Certificate
11. A communications protocol used for browsing the Internet.
War Driving
A S
Community String
Hypertext Transfer Protocol (HTTP)
12. A set of rules defined by a system administrator that indicates whether access is allowed or denied to resource objects.
Authentication Header (AH)
Detective Controls
Authorization
rule-based access control
13. ICMP Type/Code 0-0
Serial Line Internet Protocol (SLIP)
Discretionary Access Control (DAC)
open source
Echo Reply
14. The level of importance assigned to an IT asset
hash
Syslog
Multipartite virus
Information Technology (IT) asset criticality
15. The act of using numerous electronic serial numbers on a cell phone until a valid number is located.
Digital Watermarking
Multipartite virus
Tumbling
Active Fingerprinting
16. A tool that helps a company to compare its actual performance with its potential performance.
gap analysis
Ciphertext
iris scanner
A
17. Hex 12
SAM
HTTP tunneling
Dumpster Diving
A S
18. An Internet routing protocol used to exchange routing information within an autonomous system.
Interior Gateway Protocol (IGP)
Discretionary Access Control (DAC)
Brute-Force Password Attack
reverse lookup; reverse DNS lookup
19. The set of all hardware - firmware - and/or software components critical to IT security. Bugs or vulnerabilities occurring inside the TCB might jeopardize the security properties of the entire system.
Filter
Trusted Computer Base (TCB)
File Allocation Table (FAT)
Serial Line Internet Protocol (SLIP)
20. Layer 2 of the OSI reference model. This layer provides reliable transit of data across a physical link. The Data Link layer is concerned with physical addressing - network topology - access to the network medium - error detection - sequential delive
Warm Site
Data Link layer
Level I assessment
DNS enumeration
21. ICMP Type/Code 3-13
POP 3
Possession of access devices
Administratively Prohibited
Access Control List (ACL)
22. A free - open source version of the Berkeley Software Distribution of Unix - often used in embedded systems.
intrusion prevention system (IPS)
parallel scan & 300 sec timeout & 1.25 sec/probe
Annualized Loss Expectancy (ALE)
NetBSD
23. A hardware device used to log keystrokes covertly. Hardware keystroke loggers are very dangerous due to the fact that they cannot be detected through regular software/anti-malware scanning.
Defines legal email marketing
Level I assessment
Time To Live (TTL)
hardware keystroke logger
24. An enumeration technique used to provide information about a computer system; generally used for operating system identification (also known as fingerprinting).
Banner Grabbing
keylogger
Institute of Electrical and Electronics Engineers (IEEE)
Tunneling
25. A standard that provides best-practice recommendations on information security management for use by those responsible for initiating - implementing - or maintaining Information Security Management Systems (ISMS). Information security is defined with
File Allocation Table (FAT)
ISO 17799
Time exceeded
Authentication
26. The act of checking some sequence of tokens for the presence of the constituents of some pattern.
404EE
Master boot record infector
pattern matching
XOR Operation
27. A set of exclusive rights granted by the law of a jurisdiction to the author or creator of an original work - including the right to copy - distribute - and adapt the work.
overt channel
serial scan & 300 sec wait
Copyright
fragmentation
28. Chronological record of system activities to enable the reconstruction and examination of the sequence of events and changes in an event.
Audit Data
serialize scans & 0.4 sec wait
Interior Gateway Protocol (IGP)
Transmission Control Protocol (TCP)
29. Nmap normal output
Competitive Intelligence
heuristic scanning
-oN
intrusion prevention system (IPS)
30. Version Detection Scan
Wi-Fi Protected Access (WPA)
-sV
site survey
SAM
31. An Application layer protocol - using TCP - for transporting files across an Internet connection. FTP transmits in clear text.
File Transfer Protocol (FTP)
-sU
-oA
Unicode
32. A method of defining what rights and permissions an entity has to a given resource. In networking - Access Control Lists are commonly associated with firewall and router traffic filtering rules.
HTTP tunneling
Access Control List (ACL)
Echo request
Kerberos
33. In penetration testing - this is a method of testing the security of a system or subnet without any previous knowledge of the device or network. Designed to simulate an attack by an outside intruder (usually from the Internet).
Zombie
Electronic serial number
Black Box Testing
Audit Data
34. Layer 7 of the OSI reference model. The Application layer provides services to applications - which allow them access to the network. Protocols such as FTP and SMTP reside here.
Defines legal email marketing
Administratively Prohibited
Application Layer
false rejection rate (FRR)
35. A skilled hacker that straddles the line between white hat (hacking only with permission and within guidelines) and black hat (malicious hacking for personal gain). Gray hats sometime perform illegal acts to exploit technology with the intent of achi
limitation of liability and remedies
scope creep
gray hat
Vulnerability Scanning
36. A sublayer of layer 2 of the OSI model - the Data Link layer. It provides addressing and channel access control mechanisms that enable several terminals or network nodes to communicate within a multipoint network.
Baseline
segment
NT LAN Manager (NTLM)
Media Access Control (MAC)
37. An attack that exploits the common mistake many people make when installing operating systems
ad hoc mode
gray box testing
operating system attack
Hacks without permission
38. Attacks that take advantage of the built-in code and scripts most off-the-shelf applications come with.
shrink-wrap code attacks
Certificate Authority (CA)
risk
Common Internet File System/Server Message Block
39. Port 31337
End User Licensing Agreement (EULA)
ECHO reply
Back orifice
-PT
40. Provides router-to-router or host-to-network connections over asynchronous and synchronous circuits.
Three-Way (TCP) Handshake
TACACS
Point-to-Point Protocol (PPP)
payload
41. A data encryption/decryption program often used for e-mail and file storage.
Collision Domain
Banner Grabbing
security controls
Pretty Good Privacy (PGP)
42. A method used to prevent IDS detection by dividing the request into multiple parts that are sent in different packets
John the Ripper - LOphtcrack - Ophtcrack - Cain and Abel
impersonation
sniffer
session splicing
43. Polymorphic Virus
ping sweep
self encrypting
Adware
node
44. Port 161/162
-sP
SNMP
parallel scan
U P F
45. A method of password cracking whereby all possible options are systematically enumerated until a match is found. These attacks try every password (or authentication option) - one after another - until successful. Bruteforce attacks take a long time t
Written Authorization
Methodology
-sU
Brute-Force Password Attack
46. The process of a system providing a fully qualified domain name (FQDN) to a local name server - for resolution to its corresponding IP address.
Adware
Domain Name System (DNS) lookup
SMB
Macro virus
47. A utility that traces a packet from your computer to an Internet host - showing how many hops the packet takes to reach the host and how long the packet requires to complete the hop.
security by obscurity
Traceroute
Port Address Translation (PAT)
Information Technology Security Evaluation Criteria (ITSEC)
48. Management policy and procedures designed to maintain or restore business operations - including computer operations - possibly at an alternate location - in the event of emergencies - system failures - or disaster.
Administratively Prohibited
gap analysis
Media Access Control (MAC)
Contingency Plan
49. Weakness in an information system - system security procedures - internal controls - or implementation that could be exploited or triggered by a threat source.
Bastion host
remote access
spyware
Vulnerability
50. Evaluation in which testers attempt to penetrate the network.
Routing Information Protocol (RIP)
Time Bomb
Three-Way (TCP) Handshake
Level III assessment