SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A derogatory term used to describe an attacker - usually new to the field - who uses simple - easy-to-follow scripts or programs developed by others to attack computer systems and networks and deface websites.
script kiddie
-P0
R
Decryption
2. An attack in which the hacker can derive information from the ciphertext without actually decoding it. Sensitive information can be considered compromised if an adversary can infer its real value with a high level of confidence.
Ciphertext
Last In First Out (LIFO)
gap analysis
inference attack
3. Computer software or hardware that can intercept and log traffic passing over a digital network.
-sT
sniffer
Internet Assigned Number Authority (IANA)
network operations center (NOC)
4. A nonroutable IP address range intended for use only within the confines of a single organization - falling within the predefined ranges of 10.0.0.0 - 172.16-31.0.0 - or 192.168.0.0.
-sL
DNS
private network address
route
5. The process of recording activity on a system for monitoring and later review.
Auditing
personal identification number (PIN)
Internet Assigned Number Authority (IANA)
Virus Hoax
6. Sneaky scan timing
Packet Internet Groper (ping)
White Box Testing
False Acceptance Rate (FAR)
serialize scans & 15 sec wait
7. A security tool designed to protect a system or network against attacks by comparing traffic patterns against a list of both known attack signatures and general characteristics of how attacks may be carried out. Threats are rated and protective measu
remote procedure call (RPC)
Buffer Overflow
physical security
intrusion prevention system (IPS)
8. A symmetric - block-cipher data-encryption standard that uses a variablelength key that can range from 32 bits to 448 bits.
hashing algorithm
Accountability
SID
Blowfish
9. Formerly Redundant Array of Inexpensive Disks; a technology that provides increased storage functions and reliability through redundancy. This is achieved by combining multiple disk drive components into a logical unit - where data is distributed acr
gateway
promiscuous mode
network tap
Redundant Array of Independent Disks (RAID)
10. The public portion of an asymmetric key pair typically used to encrypt data or verify signatures. Public keys are shared and are used to encrypt messages.
physical security
Application Layer
public key
Level I assessment
11. A system used by the Securities and Exchange Commission (SEC) for companies and businesses to transmit required filings and information. The EDGAR database performs automated collection - validation - indexing - acceptance - and forwarding of submiss
payload
EDGAR database
Finding a directory listing and gaining access to a parent or root file for access to other files
Block Cipher
12. An attacker who breaks into computer systems with malicious intent - without the owner's knowledge or permission.
Fiber Distributed Data Interface (FDDI)
intrusion prevention system (IPS)
-b
Black Hat
13. A NAT method in which multiple internal hosts - using private IP addressing - can be mapped through a single public IP address using the session IDs and port numbers. An internal global IP address can support in excess of 65 -000 concurrent TCP and U
POP 3
Port Address Translation (PAT)
Vulnerability Scanning
Telnet
14. Attacks on the actual programming code of an application.
Application-Level Attacks
logic bomb
U P F
Traceroute
15. Malware designed to install some sort of virus - backdoor - and so on - on a target system.
Droppers
session hijacking
Authentication
Web Spider
16. Security identifier. The method by which Windows identifies user - group - and computer accounts for rights and permissions.
polymorphic virus
operating system attack
SID
open source
17. Actions - devices - procedures - techniques - or other measures intended to reduce the vulnerability of an information system.
HIDS
spam
Countermeasures
SMB
18. The process of attaching a particular protocol header and trailer to a unit of data before transmission on the network. Occurs at layer 2 of the OSI reference model.
Internet Control Message Protocol (ICMP)
encapsulation
security incident response team (SIRT)
Point-to-Point Protocol (PPP)
19. A software or hardware defect that often results in system vulnerabilities.
Bluejacking
Bug
Secure Sockets Layer (SSL)
Finger
20. Host-based IDS. An IDS that resides on the host - protecting against file and folder manipulation and other host-based attacks and actions.
HIDS
Rijndael
ad hoc mode
Confidentiality
21. A utility that traces a packet from your computer to an Internet host - showing how many hops the packet takes to reach the host and how long the packet requires to complete the hop.
Traceroute
-sP
802.11
self encrypting
22. The last portion of the SID that identifies the user to the system in Windows. A RID of 500 identifies the administrator account.
Algorithm
RID Resource identifier
Authentication - Authorization - and Accounting (AAA)
Cold Site
23. A standard for encrypting e-mail - web pages - and other stream-oriented information transmitted over the Internet.
Transport Layer Security (TLS)
router
-sT
CNAME record
24. A method of defining what rights and permissions an entity has to a given resource. In networking - Access Control Lists are commonly associated with firewall and router traffic filtering rules.
Virtual Private Network (VPN)
phishing
Cookie
Access Control List (ACL)
25. A cryptographic attack where bits are manipulated in the ciphertext itself to generate a predictable outcome in the plaintext once it is decrypted.
Wi-Fi
Application-Level Attacks
Bit Flipping
False Acceptance Rate (FAR)
26. A method of permitting only MAC addresses in a preapproved list network access. Addresses not matching are blocked.
penetration testing
overt channel
MAC filtering
Real application encompassing Trojan
27. Port 389
Bastion host
Availability
LDAP
Vulnerability Management
28. Also known as the dot-dot-slash attack. Using directory traversal - the attacker attempts to access restricted directories and execute commands outside intended web server directories by using the URL to redirect to an unintended folder location.
NetBus
Directory Traversal
Trapdoor Function
Malware
29. The rate at which a biometric system will incorrectly reject an access attempt by an authorized user.
false rejection rate (FRR)
Tiger Team
-PT
Availability
30. Hex 12
A S
proxy server
Network Basic Input/Output System (NetBIOS)
Malware
31. A virus written in a macro language and usually embedded in document or spreadsheet files.
Macro virus
limitation of liability and remedies
parameter tampering
routed protocol
32. An attack technique that tricks your DNS server into believing it has received authentic information when - in reality - it has been provided fraudulent data. DNS cache poisoning affects user traffic by sending it to erroneous or malicious end points
Domain Name System (DNS) cache poisoning
DNS
asynchronous transmission
Information Technology (IT) security architecture and framework
33. A self-replicating malicious program that attempts installation beneath antivirus software by directly intercepting the interrupt handlers of the operating system to evade detection.
Echo request
Tunneling Virus
hash
Active Directory (AD)
34. The transmission of digital signals without precise clocking or synchronization.
asynchronous transmission
rule-based access control
Collision
ISO 17799
35. A standard developed to enable routers to exchange messages containing information about routes to reach subnets in the network.
heuristic scanning
Electronic serial number
Auditing
Routing Protocol
36. Steps taken to identify and limit risks to an acceptable or reasonable level of exposure.
Tiger Team
Due Diligence
R
rule-based access control
37. A utility that sends an ICMP Echo message to determine if a specific IP address is accessible; if the message receives a reply - the address is reachable.
Information Technology (IT) asset criticality
Active Attack
Packet Internet Groper (ping)
gray box testing
38. A computer process that requests a service from another computer and accepts the server's responses.
Information Technology Security Evaluation Criteria (ITSEC)
Client
phishing
spyware
39. ICMP Type/Code 11
Time exceeded
Algorithm
Due Diligence
Asset
40. An attack in which a hacker steps between two ends of an already-established communication session and uses specialized tools to guess sequence numbers to take over the channel.
ISO 17799
scope creep
Access Creep
session hijacking
41. The exploitation of a security vulnerability
Videocipher II Satellite Encryption System
remote procedure call (RPC)
security breach or security incident
Common Internet File System/Server Message Block
42. SYN Ping
-sX
-PS
TACACS
--randomize_hosts -O OS fingerprinting
43. A protocol used to pass control and error messages between nodes on the Internet.
Address Resolution Protocol (ARP)
separation of duties
Internet Control Message Protocol (ICMP)
gateway
44. The cyclical practice of identifying - classifying - remediating - and mitigating vulnerabilities.
asynchronous transmission
Address Resolution Protocol (ARP)
Vulnerability Management
Internal access to the network
45. A piece of code intentionally inserted into a software system that will perform a malicious function when specified conditions are met at some future point.
U P F
logic bomb
Block Cipher
Access Point (AP)
46. The monetary value expected from the occurrence of a risk on an asset. It is mathematically expressed as single loss expectancy (SLE) = asset value (AV)
Bluesnarfing
Mantrap
802.11
single loss expectancy (SLE)
47. A type of malware that covertly collects information about a user.
remote access
self encrypting
-PT
spyware
48. The act of secretly listening to the private conversations of others without their consent. This can also be done over telephone lines (wiretapping) - e-mail - instant messaging - and other methods of communication considered private
Tiger Team
Assessment
rogue access point
Eavesdropping
49. A networking configuration where all nodes are connected in a circle with no terminated ends on the cable.
gateway
MD5
impersonation
ring topology
50. A type of encryption where the same key is used to encrypt and decrypt the message.
Digital Watermarking
symmetric encryption
SAM
Bluetooth