SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. An attack that combines a brute-force attack with a dictionary attack.
risk transference
fully qualified domain name (FQDN)
hybrid attack
Zero Subnet
2. Actions - devices - procedures - techniques - or other measures intended to reduce the vulnerability of an information system.
keylogger
Countermeasures
OpenBSD
gray hat
3. Normal scan timing
Electronic Code Book (ECB)
parallel scan
security bulletins
qualitative analysis
4. Any kind of connection that allows you to see all traffic passing by. Generally used in reference to a NIDS (network-based IDS) to monitor all traffic.
Bluejacking
Domain Name System (DNS) lookup
reconnaissance
network tap
5. Hex 12
A S
Self Replicating
Simple Network Management Protocol (SNMP)
protocol stack
6. A list of IP addresses and corresponding MAC addresses stored on a local computer.
Address Resolution Protocol (ARP) table
Digital Signature
Fast Ethernet
Real application encompassing Trojan
7. An attack against an authentication protocol in which the attacker intercepts data in transit along the network between the claimant and verifier - but does not alter the data (in other words - eavesdropping).
Asymmetric
passive attack
inference attack
gateway
8. The science or study of protecting information - whether in transit or at rest - by using techniques to render the information unusable to anyone who does not possess the means to decrypt it.
--randomize_hosts -O OS fingerprinting
Cryptography
suicide hacker
Telnet
9. A malicious computer program with self-replication capabilities that attaches to another file and moves with the host from one computer to another.
Tiger Team
firewall
rootkit
Virus
10. Recording the time - normally in a log file - when an event happens or when information is created or modified.
False Acceptance Rate (FAR)
Institute of Electrical and Electronics Engineers (IEEE)
Tini
Timestamping
11. A utility that traces a packet from your computer to an Internet host - showing how many hops the packet takes to reach the host and how long the packet requires to complete the hop.
Last In First Out (LIFO)
Internet Control Message Protocol (ICMP)
Traceroute
stateful packet filtering
12. Port 135
RPC-DCOM
Virtual Local Area Network (VLAN)
FreeBSD
-b
13. Software or hardware components that restrict access between a protected network and the Internet - or between other sets of networks - to block unwanted use or attacks.
Presentation layer
firewall
-sX
payload
14. A decision to reduce the potential for damage to or loss of an IT asset by taking some type of action
Daisy Chaining
risk avoidance
intrusion detection system (IDS)
Serial Line Internet Protocol (SLIP)
15. A portion of memory used to temporarily store output or input data.
Hierarchical File System (HFS)
Information Technology (IT) security architecture and framework
POST
Buffer
16. The lack of clocking (imposed time ordering) on a bit stream.
Asynchronous
Computer-Based Attack
public key
Adware
17. An information assurance strategy in which multiple layers of defense are placed throughout an Information Technology system.
Defense in Depth
rootkit
Certificate
spam
18. Two or more LANs connected by a high-speed line across a large geographical area.
Wide Area Network (WAN)
rule-based access control
Block Cipher
Availability
19. A connectionless - layer 4 transport protocol. UDP is faster than TCP - but offers no reliability. A best effort is made to deliver the data - but no checks and verifications are performed to guarantee delivery. Therefore - UDP is termed a 'connectio
Backdoor
Discretionary Access Control (DAC)
User Datagram Protocol (UDP)
Methodology
20. An organized collection of data.
NetBSD
packet
Database
Sign in Seal
21. A record showing which user has accessed a given resource and what operations the user performed during a given period.
Active Fingerprinting
Audit Trail
Asymmetric Algorithm
spyware
22. A limited-function version of the Internetworking Operating System (IOS) - held in read-only memory in some earlier models of Cisco devices - capable of performing several seldom-needed low-level functions such as loading a new IOS into Flash memory
RxBoot
Computer-Based Attack
Denial of Service (DoS)
Information Technology (IT) asset valuation
23. A situation in which an IDS or other sensor triggers on an event as an intrusion attempt - when it was actually legitimate traffic.
Eavesdropping
Interior Gateway Protocol (IGP)
POST
false negative
24. A symmetric key cipher where plaintext bits are combined with a pseudo-random cipher bit stream (keystream) - typically by an exclusive-or (XOR) operation. In a stream cipher the plaintext digits are encrypted one at a time - and the transformation o
suicide hacker
stream cipher
nslookup
Baseline
25. PI and PT Ping
Zombie
Demilitarized Zone (DMZ)
-PB
Algorithm
26. A file system used by the Mac OS.
War Dialing
-sU
Hierarchical File System (HFS)
Decryption
27. A piece of code intentionally inserted into a software system that will perform a malicious function when specified conditions are met at some future point.
Active Directory (AD)
Hypertext Transfer Protocol Secure (HTTPS)
Simple Object Access Protocol (SOAP)
logic bomb
28. Black box test
sniffer
No previous knowledge of the network
Zombie
firewall
29. Computer software or hardware that can intercept and log traffic passing over a digital network.
-oG
quality of service (QoS)
Zenmap
sniffer
30. Independent review and examination of records and activities to assess the adequacy of system controls - to ensure compliance with established policies and operational procedures - and to recommend necessary changes.
audit
protocol
Black Hat
Backdoor
31. A fully qualified domain name consists of a host and domain name - including a top-level domain such as .com - .net - .mil - .edu -and so on.
Back orifice
Corrective Controls
fully qualified domain name (FQDN)
-sP
32. A network deployed as a trap to detect - deflect - or deter unauthorized use of information systems.
Lightweight Directory Access Protocol (LDAP)
honeynet
Virtual Local Area Network (VLAN)
security by obscurity
33. A step-by-step method of solving a problem. In computing security - an algorithm is a set of mathematical rules (logic) for the process of encryption and decryption
Algorithm
phishing
-sP
Secure Multipurpose Mail Extension (S/MIME)
34. A computer file system architecture used in Windows - OS/2 - and most memory cards.
File Allocation Table (FAT)
network tap
parallel scan
Telnet
35. A physical security attack where the attacker sifts through garbage and recycle bins for information that may be useful on current and future attacks
logic bomb
protocol stack
Dumpster Diving
Virus Hoax
36. A value assigned to uniquely identify a single wide area network (WAN) in wireless LANs. SSIDs are broadcast by default - and are sent in the header of every packet. SSIDs provide no encryption or security.
single loss expectancy (SLE)
Service Set Identifier (SSID)
encryption
Acknowledgment (ACK)
37. A documented process for a procedure designed to be consistent - repeatable - and accountable.
piggybacking
false rejection rate (FRR)
Methodology
packet filtering
38. Directory Transversal
Finding a directory listing and gaining access to a parent or root file for access to other files
-sT
GET
-PM
39. Authentication confirms the identity of the user or device. Authorization determines the privileges (rights) of the user or device. Accounting records the access attempts - both successful and unsuccessful.
Ethical Hacker
404EE
out-of-band signaling
Authentication - Authorization - and Accounting (AAA)
40. White hat
DNS
serial scan & 300 sec wait
Hacks with permission
Audit Trail
41. Physical socket provided on routers and switches for cable connections between a computer and the router/switch. This connection enables the computer to configure - query - and troubleshoot the router/switch by use of a terminal emulator and a comman
Internet Control Message Protocol (ICMP)
session splicing
Console Port
route
42. Sending unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobile phones - PDAs - or laptop computers.
Bluejacking
personal identification number (PIN)
HTTP tunneling
Unicode
43. A type of DNS transfer - where all records from an SOA are transmitted to the requestor. Zone transfers have two options: full (opcode AXFR) and incremental (IXFR).
Zone transfer
Eavesdropping
symmetric algorithm
network tap
44. A distance-vector routing protocol that employs the hop count as a routing metric. The 'hold down time -' used to define how long a route is held in memory - is 180 seconds. RIP prevents routing loops by implementing a limit on the number of hops all
Decryption
Routing Information Protocol (RIP)
Bluejacking
Multipartite virus
45. A command used in HTTP and FTP to retrieve a file from a server.
Reconnaissance - Scanning - Gaining Access - Maintaining Access - Covering Tracks
GET
Address Resolution Protocol (ARP)
Black Hat
46. Created by the U.S. Federal Communications Commission to uniquely identify mobile devices; often represented as an 11-digit decimal number or eight-digit hexadecimal number.
Electronic serial number
DNS enumeration
session hijacking
risk assessment
47. A Canonical Name record within DNS - used to provide an alias for a domain name.
CNAME record
nslookup
patch
Decryption
48. A technology that establishes a tunnel to create a private - dedicated - leased-line network over the Internet. The data is encrypted so it's readable only by the sender and receiver. Companies commonly use VPNs to allow employees to connect securely
Discretionary Access Control (DAC)
Cryptography
Virtual Private Network (VPN)
Wired Equivalent Privacy (WEP)
49. Insane scan timing
parallel scan & 75 sec timeout & 0.3 sec/probe
impersonation
MD5
false rejection rate (FRR)
50. Confidentiality - Integrity - and Availability are the three aspects of security and make up the triangle.
CIA triangle
symmetric algorithm
Electronic serial number
-sO