SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A software or hardware application or device that captures user keystrokes.
keylogger
Macro virus
Black Box Testing
human-based social engineering
2. The process of pinging each address within a subnet to map potential targets. Ping sweeps are unreliable and easily detectable - but very fast.
-p <port ranges>
Tiger Team
ping sweep
hash
3. A virus designed to infect the master boot record.
Wired Equivalent Privacy (WEP)
Cryptographic Key
key exchange protocol
Master boot record infector
4. Safeguards or countermeasures to avoid - counteract - or minimize security risks.
script kiddie
Vulnerability Scanning
security controls
802.11
5. A symmetric key cipher where plaintext bits are combined with a pseudo-random cipher bit stream (keystream) - typically by an exclusive-or (XOR) operation. In a stream cipher the plaintext digits are encrypted one at a time - and the transformation o
Access Point (AP)
packet
User Datagram Protocol (UDP)
stream cipher
6. A backup facility with the electrical and physical components of a computer facility - but with no computer equipment in place. The site is ready to receive the necessary replacement computer equipment in the event the user has to move from his main
encryption
Wi-Fi
Cold Site
human-based social engineering
7. A protocol for transporting data packets across a packet switched internetwork (such as the Internet). IP is a routed protocol.
-oG
integrity
Internet Protocol (IP)
The automated process of proactively identifying vulnerabilities of computing systems present in a network
8. Nmap normal output
Distributed DoS (DDoS)
-oN
session hijacking
Zero Subnet
9. A method of external testing whereby several systems or resources are used together to effect an attack.
serialize scans & 15 sec wait
ISO 17799
Daisy Chaining
security bulletins
10. An information assurance strategy in which multiple layers of defense are placed throughout an Information Technology system.
ISO 17799
Defense in Depth
Presentation layer
Tini
11. A function that is easy to compute in one direction - yet believed to be difficult to compute in the opposite direction (finding its inverse) without special information - called the 'trapdoor.' Widely used in cryptography.
A S
intranet
Trapdoor Function
physical security
12. A social-engineering attack that manipulates the victim into calling the attacker for help.
passive attack
reverse social engineering
site survey
Domain Name
13. The secret portion of an asymmetric key pair typically used to decrypt or digitally sign data. The private key is never shared and is always used for decryption - with one notable exception: The private key is used to encrypt the digital signature.
private key
Self Replicating
Digital Certificate
Daisy Chaining
14. A VPN tunneling protocol with encryption. PPTP connects two nodes in a VPN by using one TCP port for negotiation and authentication and one IP protocol for data transfer.
Time Bomb
Point-to-Point Tunneling Protocol (PPTP)
Collision
Institute of Electrical and Electronics Engineers (IEEE)
15. A symmetric key cryptographic algorithm that transforms a block of information at a time using a cryptographic key. For a block cipher algorithm - the length of the input block is the same as the length of the output block.
Block Cipher
Packet Internet Groper (ping)
ring topology
Overwhelm CAM table to convert switch to hub mode
16. 1. The path a packet travels to reach the intended destination. Each individual device along the path traveled is called a hop. 2. Information contained on a device containing instructions for reaching other nodes on the network. This information can
route
A R
packet filtering
Last In First Out (LIFO)
17. Any kind of connection that allows you to see all traffic passing by. Generally used in reference to a NIDS (network-based IDS) to monitor all traffic.
Ethical Hacker
network tap
infrastructure mode
Post Office Protocol 3 (POP3)
18. A brand name of analog scrambling and de-scrambling equipment for cable and satellite television - invented primarily to keep consumer Television receive-only (TVRO) satellite equipment from receiving TV programming except on a subscription basis.
404EE
queue
source routing
Videocipher II Satellite Encryption System
19. ICMP Type/Code 3
spyware
Destination Unreachable
reverse lookup; reverse DNS lookup
Virus
20. A method of defining what rights and permissions an entity has to a given resource. In networking - Access Control Lists are commonly associated with firewall and router traffic filtering rules.
Access Control List (ACL)
Point-to-Point Tunneling Protocol (PPTP)
Contingency Plan
ad hoc mode
21. Text or data in its encrypted form; the result of plaintext being input into a cryptographic algorithm.
Black Hat
polymorphic virus
CIA triangle
Ciphertext
22. A social-engineering attack using computer resources - such as e-mail or IRC.
Accountability
Digital Watermarking
Computer-Based Attack
Biometrics
23. The process of systematically testing each port on a firewall to map rules and determine accessible ports.
Finding a directory listing and gaining access to a parent or root file for access to other files
intrusion detection system (IDS)
firewalking
port knocking
24. Cracking Tools
Wi-Fi
risk transference
802.11 i
John the Ripper - LOphtcrack - Ophtcrack - Cain and Abel
25. A limit on the amount of time or number of iterations or transmissions in computer and network technology a packet can experience before it will be discarded.
Time To Live (TTL)
-oX
parallel scan & 300 sec timeout & 1.25 sec/probe
Wi-Fi
26. An Internet Protocol Security (IPSec) header used to verify that the contents of a packet have not been modified while the packet was in transit.
Authentication Header (AH)
port knocking
NOP
Domain Name System (DNS)
27. Hex 14
A R
U P F
Simple Mail Transfer Protocol (SMTP)
Authentication Header (AH)
28. nmap
--randomize_hosts -O OS fingerprinting
hybrid attack
Password Authentication Protocol (PAP)
router
29. The cyclical practice of identifying - classifying - remediating - and mitigating vulnerabilities.
Distributed DoS (DDoS)
rootkit
stream cipher
Vulnerability Management
30. Controls to detect anomalies or undesirable events occurring on a system.
Detective Controls
Competitive Intelligence
Distributed DoS (DDoS)
signature scanning
31. An approach to restricting system access to authorized users in which roles are created for various job functions. The permissions to perform certain operations are assigned to specific roles. Members of staff (or other system users) are assigned par
Mantrap
role-based access control
Competitive Intelligence
steganography
32. A number assigned during TCP startup sessions that tracks how much information has been moved. This number is used by hackers when hijacking sessions.
Redundant Array of Independent Disks (RAID)
encapsulation
Zenmap
initial sequence number (ISN)
33. Paranoid scan timing
serial scan & 300 sec wait
Demilitarized Zone (DMZ)
asynchronous transmission
Wiretapping
34. A pen testing method where the attacker knows all information about the internal network. It is designed to simulate an attack by a disgruntled systems administrator - or similar level.
Destination Unreachable
Domain Name System (DNS) cache poisoning
Anonymizer
White Box Testing
35. White hat
route
Hacks with permission
Authentication Header (AH)
Community String
36. The condition of a resource being ready for use and accessible by authorized users.
Availability
INFOSEC Assessment Methodology (IAM)
Challenge Handshake Authentication Protocol (CHAP)
Hacks without permission
37. An organization's threshold for the seven areas of information security responsibility. This level is established based on the objectives for maintaining confidentiality - integrity - and availability of the organization's IT assets and infrastructur
Application-Level Attacks
Threat
Client
Minimum acceptable level of risk
38. Ping Scan
-sP
Collision Domain
quality of service (QoS)
Kerberos
39. An unknown deficiency in software or some other product that results in a security vulnerability being identified.
Bluesnarfing
security defect
Interior Gateway Protocol (IGP)
node
40. The process of determining if a network entity (user or service) is legitimate
Authentication
Eavesdropping
Cryptographic Key
Buffer Overflow
41. A legal limit on the amount of financial liability and remedies the organization is responsible for taking on.
Institute of Electrical and Electronics Engineers (IEEE)
Tini
key exchange protocol
limitation of liability and remedies
42. The act or actions of a hacker to put forward a cause or a political agenda - to affect some societal change - or to shed light on something he feels to be political injustice. These activities are usually illegal in nature.
hacktivism
Copyright
A R
hybrid attack
43. TCP connect() scan
User Datagram Protocol (UDP)
red team
-sT
Computer-Based Attack
44. TCP Ping
Certificate Authority (CA)
Black Box Testing
promiscuous mode
-PT
45. A person or entity indirectly involved in a relationship between two principles.
Domain Name System (DNS) lookup
Third Party
A procedure for identifying active hosts on a network.
Wiretapping
46. Network Scanning
A procedure for identifying active hosts on a network.
false rejection rate (FRR)
Due Diligence
Mandatory access control (MAC)
47. Malicious code that uses a polymorphic engine to mutate while keeping the original algorithm intact; the code changes itself each time it runs - but the function of the code will not change.
User Datagram Protocol (UDP)
Directory Traversal
payload
polymorphic virus
48. A section or subset of the network. Often a router or other routing device provides the end point of the segment.
Internet service provider (ISP)
parallel scan & 75 sec timeout & 0.3 sec/probe
segment
U P F
49. An Application layer protocol used primarily by Microsoft Windows to provide shared access to printers - files - and serial ports. It also provides an authenticated interprocess communication mechanism.
Network Address Translation (NAT)
SYN flood attack
encapsulation
Common Internet File System/Server Message Block
50. Shifting responsibility from one party to another
security controls
risk transference
gap analysis
Administratively Prohibited
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests