SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Layer 7 of the OSI reference model. The Application layer provides services to applications - which allow them access to the network. Protocols such as FTP and SMTP reside here.
sniffer
-PP
Challenge Handshake Authentication Protocol (CHAP)
Application Layer
2. A protocol for transporting data packets across a packet switched internetwork (such as the Internet). IP is a routed protocol.
Internet Protocol (IP)
hybrid attack
HTTP
Vulnerability Management
3. Also known as a public key certificate - this is an electronic file that is used to verify a user's identity - providing non-repudiation throughout the sys-tem. Certificates contain the entity's public key - serial number - version - subject - algori
CIA triangle
Droppers
spoofing
Digital Certificate
4. A fully qualified domain name consists of a host and domain name - including a top-level domain such as .com - .net - .mil - .edu -and so on.
Adware
logic bomb
Authentication Header (AH)
fully qualified domain name (FQDN)
5. A type of attack used to deny service to legitimate users of a network resource by intentionally overloading the network with illegitimate TCP connection requests. SYN packets are sent repeatedly to the target - but the corresponding SYN/ACK response
Audit Trail
parameter tampering
SYN flood attack
Malicious code
6. A protocol for exchanging packets over a serial line.
Certificate Authority (CA)
Kerberos
Media Access Control (MAC)
Serial Line Internet Protocol (SLIP)
7. Directing a protocol from one port to another.
Simple Network Management Protocol (SNMP)
-sV
port redirection
network interface card (NIC)
8. A protocol used to pass control and error messages between nodes on the Internet.
Certificate
The automated process of proactively identifying vulnerabilities of computing systems present in a network
session hijacking
Internet Control Message Protocol (ICMP)
9. A method in cryptography by which cryptographic keys are exchanged between users - allowing use of a cryptographic algorithm (for example - the Diffie-Hellman key exchange).
CAM table
Service Set Identifier (SSID)
Lightweight Directory Access Protocol (LDAP)
key exchange protocol
10. An inspection of a place where a company or individual proposes to work - to gather the necessary information for a design or risk assessment.
network operations center (NOC)
site survey
Covert Channel
-PI
11. A protocol used for sending and receiving log information for nodes on a network.
Request for Comments (RFC)
Timestamping
Syslog
fully qualified domain name (FQDN)
12. Port 135
Virus Hoax
sniffer
RPC-DCOM
Crossover Error Rate (CER)
13. Transmitting one protocol encapsulated inside another protocol.
Tunneling
Brute-Force Password Attack
War Chalking
false rejection rate (FRR)
14. Any kind of connection that allows you to see all traffic passing by. Generally used in reference to a NIDS (network-based IDS) to monitor all traffic.
Ethernet
open source
network tap
Black Hat
15. A programming principle whereby the last piece of data added to the stack is the first piece of data taken off.
SMB
risk avoidance
quality of service (QoS)
Last In First Out (LIFO)
16. MAC Flooding
Overwhelm CAM table to convert switch to hub mode
gateway
Information Technology (IT) asset valuation
-sV
17. nmap
FreeBSD
Hypertext Transfer Protocol Secure (HTTPS)
-p <port ranges>
Detective Controls
18. The monetary loss that can be expected for an asset due to risk over a one-year period. ALE is the product of the annual rate of occurrence (ARO) and the single loss expectancy (SLE). It is mathematically expressed as ALE = ARO
Cryptography
smart card
Boot Sector Virus
Annualized Loss Expectancy (ALE)
19. White hat
-PI
Hacks with permission
Sign in Seal
Level II assessment
20. A utility that sends an ICMP Echo message to determine if a specific IP address is accessible; if the message receives a reply - the address is reachable.
A
Bluejacking
SMB
Packet Internet Groper (ping)
21. A mode of operation for a block cipher - with the characteristic that each possible block of plaintext has a defined corresponding ciphertext value - and vice versa
SID
Electronic Code Book (ECB)
Fraud and related activity in connection with computers
Information Technology (IT) asset criticality
22. A virus that plants itself in a system's boot sector and infects the master boot record.
quality of service (QoS)
Boot Sector Virus
Application-Level Attacks
social engineering
23. A penetration test in which the ethical hacker has limited knowledge of the intended target(s). Designed to simulate an internal - but non-systemadministrator-level attack.
Distributed DoS (DDoS)
DNS enumeration
gray box testing
polymorphic virus
24. The subjective - potential percentage of loss to a specific asset if a specific threat is realized. The exposure factor (EF) is a subjective value the person assessing risk must define.
File Allocation Table (FAT)
EDGAR database
Acceptable Use Policy (AUP)
Exposure Factor
25. A unique numerical string - created by a hashing algorithm on a given piece of data - used to verify data integrity. Generally hashes are used to verify the integrity of files after download (comparison to the hash value on the site before download)
penetration testing
Bluetooth
firewalking
hash
26. An API that provides services related to the OSI model's Session layer - allowing applications on separate computers to communicate over a LAN.
Transport Layer Security (TLS)
Network Basic Input/Output System (NetBIOS)
Simple Object Access Protocol (SOAP)
key exchange protocol
27. An international encoding standard - working within multiple languages and scripts - that represents each letter - digit - or symbol with a unique numeric value that applies across different platforms.
A R
Unicode
Wi-Fi Protected Access (WPA)
session splicing
28. An environmentally conditioned workspace partially equipped with IT and telecommunications equipment to support relocated IT operations in the event of a significant disruption.
Pretty Good Privacy (PGP)
Warm Site
-oG
Bastion host
29. A U.S. Department of Defense (DoD) standard that sets basic requirements for assessing the effectiveness of computer security controls built into a computer system.
parallel scan & 300 sec timeout & 1.25 sec/probe
nslookup
Trusted Computer System Evaluation Criteria (TCSEC)
Copyright
30. A well-known and studied phenomenon of human nature - whereby a single trait influences the perception of other traits.
logic bomb
flood
patch
halo effect
31. A wireless networking mode where all clients connect to the wireless network through a central access point.
Malware
Finger
Virtual Local Area Network (VLAN)
infrastructure mode
32. A symmetric key cryptographic algorithm that transforms a block of information at a time using a cryptographic key. For a block cipher algorithm - the length of the input block is the same as the length of the output block.
MD5
Packet Internet Groper (ping)
Block Cipher
NetBSD
33. A malicious computer program with self-replication capabilities that attaches to another file and moves with the host from one computer to another.
Ethical Hacker
Active Directory (AD)
Port Address Translation (PAT)
Virus
34. A secret - typically consisting of only decimal digits - that a claimant memorizes and uses to authenticate his identity
personal identification number (PIN)
Block Cipher
stateful packet filtering
Possession of access devices
35. Evaluation in which testers attempt to penetrate the network.
Wiretapping
Level III assessment
Replacing numbers in a url to access other files
hardware keystroke logger
36. Self-contained network with a limited number of participants who extend limited trust to one another in order to accomplish an agreed-upon goal.
security bulletins
Possession of access devices
intranet
Bug
37. Manipulating a search string with additional specific operators to search for vulnerabilities or very specific information.
Application Layer
Collision Domain
Google hacking
Accountability
38. A system used by the Securities and Exchange Commission (SEC) for companies and businesses to transmit required filings and information. The EDGAR database performs automated collection - validation - indexing - acceptance - and forwarding of submiss
Replacing numbers in a url to access other files
intranet
EDGAR database
War Dialing
39. The default network authentication suite of protocols for Windows NT 4.0
Black Hat
NT LAN Manager (NTLM)
phishing
Defense in Depth
40. White box test
Internal access to the network
Droppers
Demilitarized Zone (DMZ)
Asynchronous
41. Terminal Access Controller Access-Control System. A remote authentication protocol that is used to communicate with an authentication server commonly used in Unix networks.
Decryption
TACACS
human-based social engineering
Challenge Handshake Authentication Protocol (CHAP)
42. The exploitation of a security vulnerability
POST
security breach or security incident
Brute-Force Password Attack
Droppers
43. The basis of this kind of security is that an individual user - or program operating on the user's behalf - is allowed to specify explicitly the types of access other users (or programs executing on their behalf) may have to information under the use
Discretionary Access Control (DAC)
XOR Operation
End User Licensing Agreement (EULA)
SAM
44. Nmap grepable output
Wired Equivalent Privacy (WEP)
Finding a directory listing and gaining access to a parent or root file for access to other files
-oG
reverse lookup; reverse DNS lookup
45. Polite scan timing
TACACS
RID Resource identifier
Transmission Control Protocol (TCP)
serialize scans & 0.4 sec wait
46. An attack against an authentication protocol in which the attacker intercepts data in transit along the network between the claimant and verifier - but does not alter the data (in other words - eavesdropping).
passive attack
fully qualified domain name (FQDN)
operating system attack
Covert Channel
47. A hacker who aims to bring down critical infrastructure for a 'cause' and does not worry about the penalties associated with his actions.
suicide hacker
Archive
-P0
Mantrap
48. All measures and techniques taken to gather information about an intended target. Footprinting can be passive or active.
hybrid attack
qualitative analysis
footprinting
Level II assessment
49. ICMP Type/Code 3
-sI
Computer-Based Attack
spyware
Destination Unreachable
50. The steps taken to gather evidence and information on the targets you wish to attack.
reconnaissance
-PM
segment
Warm Site