SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A term representing the responsibility managers and their organizations have to provide information security to ensure the type of control - the cost of control - and the deployment of control are appropriate for the system being managed.
Due Care
parallel scan & 300 sec timeout & 1.25 sec/probe
symmetric encryption
Cryptographic Key
2. Monitoring of telephone or Internet conversations - typically by covert means.
Ciphertext
integrity
Wiretapping
net use \[target ip]IPC$ '' /user:''
3. The conveying of official access or legal power to a person or entity.
Authorization
risk acceptance
Block Cipher
HTTP
4. Conversion of plaintext to ciphertext through the use of a cryptographic algorithm.
Directory Traversal
intranet
encryption
Exploit
5. A method of defining what rights and permissions an entity has to a given resource. In networking - Access Control Lists are commonly associated with firewall and router traffic filtering rules.
Access Control List (ACL)
FTP
Cold Site
role-based access control
6. A protocol that uses a private key to encrypt data before transmitting confidential documents over the Internet; widely used on e-commerce - banking - and other sites requiring privacy.
iris scanner
-PT
Secure Sockets Layer (SSL)
routed protocol
7. Layer 7 of the OSI reference model. The Application layer provides services to applications - which allow them access to the network. Protocols such as FTP and SMTP reside here.
Database
Application Layer
Service Set Identifier (SSID)
DNS
8. A documented process for a procedure designed to be consistent - repeatable - and accountable.
Hierarchical File System (HFS)
physical security
-PS
Methodology
9. A computer process that requests a service from another computer and accepts the server's responses.
Antivirus (AV) software
Hypertext Transfer Protocol Secure (HTTPS)
Client
node
10. An organization composed of engineers - scientists - and students who issue standards related to electrical - electronic - and computer engineering.
Cache
Black Hat
Institute of Electrical and Electronics Engineers (IEEE)
Trapdoor Function
11. White box test
Internal access to the network
Availability
Tumbling
protocol
12. An attacker who breaks into computer systems with malicious intent - without the owner's knowledge or permission.
Black Hat
private key
Address Resolution Protocol (ARP)
MD5
13. A type 0 ICMP message used to reply to ECHO requests. Used with ping to verify network layer connectivity between hosts.
SOA record
security incident response team (SIRT)
RID Resource identifier
ECHO reply
14. A security protocol used in IEEE 802.11i to replace WEP without the requirement to replace legacy hardware.
802.11
Temporal Key Integrity Protocol (TKIP)
Mandatory access control (MAC)
Overwhelm CAM table to convert switch to hub mode
15. A step-by-step method of solving a problem. In computing security - an algorithm is a set of mathematical rules (logic) for the process of encryption and decryption
forwarding
sidejacking
Algorithm
RPC-DCOM
16. The act of checking some sequence of tokens for the presence of the constituents of some pattern.
SAM
Methodology
infrastructure mode
pattern matching
17. A derogatory term used to describe an attacker - usually new to the field - who uses simple - easy-to-follow scripts or programs developed by others to attack computer systems and networks and deface websites.
-sT
script kiddie
User Datagram Protocol (UDP)
RPC-DCOM
18. A software or hardware defect that often results in system vulnerabilities.
Bug
Unicode
limitation of liability and remedies
SOA record
19. A situation in which an IDS or other sensor triggers on an event as an intrusion attempt - when it was actually legitimate traffic.
Self Replicating
public key infrastructure (PKI)
false negative
false rejection rate (FRR)
20. MAC Flooding
spoofing
FTP
Vulnerability Scanning
Overwhelm CAM table to convert switch to hub mode
21. Traffic-passing technique used by bridges and switches in which traffic received on an interface is sent out all interfaces on the device except the interface on which the information was originally received. Traffic on a switch is flooded when it is
Overwhelm CAM table to convert switch to hub mode
Level III assessment
flood
Pretty Good Privacy (PGP)
22. Safeguards or countermeasures to avoid - counteract - or minimize security risks.
security controls
Wired Equivalent Privacy (WEP)
Event
rogue access point
23. A Unix-like computer operating system descending from the BSD. Open-BSD includes a number of security features absent or optional in other operating systems.
SAM
ping sweep
GET
OpenBSD
24. Recording the time - normally in a log file - when an event happens or when information is created or modified.
LDAP
Timestamping
hash
parallel scan & 300 sec timeout & 1.25 sec/probe
25. An evaluation conducted to determine the potential for damage to or loss of an IT asset.
Domain Name System (DNS) cache poisoning
risk assessment
intrusion detection system (IDS)
gateway
26. As an identification device becomes more sensitive or accurate - its FAR decreases while its FRR increases. The CER is the point at which these two rates are equal - or cross over.
false rejection rate (FRR)
DNS
Virus Hoax
packet
27. Hex 10
Network Basic Input/Output System (NetBIOS)
A
Institute of Electrical and Electronics Engineers (IEEE)
Secure Sockets Layer (SSL)
28. An HTTP command to transmit text to a web server for processing. The opposite of an HTTP GET.
Bluetooth
Virtual Local Area Network (VLAN)
POST
Tunneling
29. ICMP Type/Code 8
private network address
-b
Echo request
-sR
30. A denial-of-service attack where the attacker sends a ping to the network's broadcast address from the spoofed IP address of the target. All systems in the subnet then respond to the spoofed address - eventually flooding the device.
serial scan & 300 sec wait
Buffer Overflow
Smurf attack
Countermeasures
31. A value assigned to uniquely identify a single wide area network (WAN) in wireless LANs. SSIDs are broadcast by default - and are sent in the header of every packet. SSIDs provide no encryption or security.
parallel scan & 300 sec timeout & 1.25 sec/probe
Tunneling Virus
Service Set Identifier (SSID)
Application Layer
32. A technology where you advertise one IP address externally and data packets are rerouted to the appropriate IP address inside your network by a device providing translation services. In this way - IP addresses of machines on your internal network are
R
flood
Network Address Translation (NAT)
Sign in Seal
33. An outdated symmetric cipher encryption algorithm - previously U.S. government-approved and used by business and civilian government agencies. DES is no longer considered secure due to the ease with which the entire keyspace can be attempted using mo
Authorization
-sR
Data Encryption Standard (DES)
piggybacking
34. A set of rules defined by a system administrator that indicates whether access is allowed or denied to resource objects.
rule-based access control
private key
SID
-P0
35. Transmitting one protocol encapsulated inside another protocol.
Tunneling
Level I assessment
Zone transfer
The automated process of proactively identifying vulnerabilities of computing systems present in a network
36. A means of exchanging information from one entity to another using a process that does not provide an attacker the opportunity to reorder - delete - insert - or read information.
Domain Name System (DNS)
Algorithm
secure channel
Electronic serial number
37. A point-to-point connection between two endpoints created to exchangedata. Typically a tunnel is either an encrypted connection - or a connection using a protocol in a method for which it was not designed. An encrypted connection forms a point-to-poi
War Driving
DNS
Tunnel
Active Attack
38. Software or firmware intended to perform an unauthorized process that will have an adverse impact on the confidentiality - integrity - or availability of an information system. A virus - worm - Trojan horse - or other code-based entity that infects a
Domain Name System (DNS) cache poisoning
secure channel
Malicious code
Eavesdropping
39. A computer network confined to a relatively small area - such as a single building or campus.
local area network (LAN)
security by obscurity
source routing
Algorithm
40. Weakness in an information system - system security procedures - internal controls - or implementation that could be exploited or triggered by a threat source.
false negative
Whois
Uniform Resource Locator (URL)
Vulnerability
41. Two or more LANs connected by a high-speed line across a large geographical area.
Contingency Plan
Mantrap
Finger
Wide Area Network (WAN)
42. Any kind of connection that allows you to see all traffic passing by. Generally used in reference to a NIDS (network-based IDS) to monitor all traffic.
logic bomb
false rejection rate (FRR)
network tap
Digital Watermarking
43. nmap all output
Bluesnarfing
-oA
Extensible Authentication Protocol (EAP)
Droppers
44. A cell phone attack in which the serial number from one cell phone is copied to another in an effort to copy the cell phone.
Bug
Redundant Array of Independent Disks (RAID)
Cloning
session splicing
45. A wireless networking mode where all clients connect to the wireless network through a central access point.
Trojan Horse
infrastructure mode
Mantrap
CAM table
46. SYN Ping
Countermeasures
Zero Subnet
-PS
risk assessment
47. Port 110
site survey
POP 3
Information Technology (IT) asset valuation
ISO 17799
48. An attack where the hacker manipulates parameters within the URL string in hopes of modifying data.
parameter tampering
A R
Confidentiality
Extensible Authentication Protocol (EAP)
49. A social-engineering attack that manipulates the victim into calling the attacker for help.
Routing Protocol
Contingency Plan
Wrapper
reverse social engineering
50. A trusted entity that issues and revokes public key certificates. In a network - a CA is a trusted entity that issues - manages - and revokes security credentials and public keys for message encryption and/or authentication. Within a public key infra
-sF
Internet service provider (ISP)
Countermeasures
Certificate Authority (CA)