SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A protocol defining packets that are able to be routed by a router.
R
SNMP
routed protocol
Mandatory access control (MAC)
2. ICMP Type/Code 3-13
security kernel
Password Authentication Protocol (PAP)
Algorithm
Administratively Prohibited
3. Provides data encryption for IEEE 802.11 wireless networks so data can only be decrypted by the intended recipients.
User Datagram Protocol (UDP)
keylogger
Wi-Fi Protected Access (WPA)
Audit Data
4. A type of denial-of-service attack where a hacker sends thousands of SYN packets to the target with spoofed IP addresses.
reverse social engineering
Wi-Fi Protected Access (WPA)
SYN attack
Interior Gateway Protocol (IGP)
5. Black box test
SMB
Methodology
No previous knowledge of the network
halo effect
6. A record showing which user has accessed a given resource and what operations the user performed during a given period.
Domain Name
-sR
Audit Trail
Boot Sector Virus
7. A mathematical operation requiring two binary inputs: If the inputs match - the output is a 0 - otherwise it is a 1.
XOR Operation
Echo request
router
-sU
8. TCP Ping
-PT
Whois
security bulletins
Exploit
9. A type 0 ICMP message used to reply to ECHO requests. Used with ping to verify network layer connectivity between hosts.
GET
ECHO reply
SID
Availability
10. A business - government agency - or educational institution that provides access to the Internet.
Eavesdropping
Audit Trail
Internet service provider (ISP)
Self Replicating
11. Devices - connected to one or more switches - grouped logically into a single broadcast domain. VLANs enable administrators to divide the devices connected to the switches into multiple VLANs without requiring separate physical switches.
Vulnerability Assessment
Routing Information Protocol (RIP)
Virtual Local Area Network (VLAN)
red team
12. As an identification device becomes more sensitive or accurate - its FAR decreases while its FRR increases. The CER is the point at which these two rates are equal - or cross over.
Demilitarized Zone (DMZ)
-oA
false rejection rate (FRR)
Virus Hoax
13. Layer 2 of the OSI reference model. This layer provides reliable transit of data across a physical link. The Data Link layer is concerned with physical addressing - network topology - access to the network medium - error detection - sequential delive
serialize scans & 15 sec wait
Level I assessment
War Chalking
Data Link layer
14. An evaluation consisting of a document review - interviews - and demonstrations - as well as vulnerability scans and hands-on testing.
Level II assessment
--randomize_hosts -O OS fingerprinting
Possession of access devices
parallel scan
15. A social-engineering attack using computer resources - such as e-mail or IRC.
patch
Bluetooth
Computer-Based Attack
role-based access control
16. A device or service designed to obfuscate traffic between a client and the Internet. Generally used to make activity on the Internet as untraceable as possible.
quantitative risk assessment
Virtual Local Area Network (VLAN)
null session
Anonymizer
17. A self-replicating - self-propagating - self-contained program that uses networking mechanisms to spread itself.
Digital Certificate
Worm
Console Port
-P0
18. Occurs when authorized users accumulate excess privileges on a system due to moving from position to position.
Access Creep
Daisy Chaining
SOA record
Target Of Engagement (TOE)
19. A hacker who aims to bring down critical infrastructure for a 'cause' and does not worry about the penalties associated with his actions.
Application Layer
Telnet
suicide hacker
Internet service provider (ISP)
20. The steps taken to gather evidence and information on the targets you wish to attack.
Certificate
Baseline
reconnaissance
queue
21. A legal limit on the amount of financial liability and remedies the organization is responsible for taking on.
steganography
limitation of liability and remedies
Internet service provider (ISP)
HIDS
22. A point-to-point connection between two endpoints created to exchangedata. Typically a tunnel is either an encrypted connection - or a connection using a protocol in a method for which it was not designed. An encrypted connection forms a point-to-poi
Information Technology (IT) asset valuation
Domain Name System (DNS)
Tunnel
White Box Testing
23. ICMP Ping
parallel scan & 75 sec timeout & 0.3 sec/probe
-PI
session hijacking
Demilitarized Zone (DMZ)
24. A protocol that uses a private key to encrypt data before transmitting confidential documents over the Internet; widely used on e-commerce - banking - and other sites requiring privacy.
enumeration
Trojan Horse
Vulnerability Assessment
Secure Sockets Layer (SSL)
25. The exploitation of a security vulnerability
security breach or security incident
Extensible Authentication Protocol (EAP)
Network Basic Input/Output System (NetBIOS)
Active Attack
26. A secret - typically consisting of only decimal digits - that a claimant memorizes and uses to authenticate his identity
self encrypting
encryption
remote procedure call (RPC)
personal identification number (PIN)
27. The public portion of an asymmetric key pair typically used to encrypt data or verify signatures. Public keys are shared and are used to encrypt messages.
non-repudiation
risk acceptance
public key
Accountability
28. A hacking method for stealing the cookies used during a session build and replaying them for unauthorized connection purposes.
net use \[target ip]IPC$ '' /user:''
Uniform Resource Locator (URL)
POP 3
sidejacking
29. Authentication confirms the identity of the user or device. Authorization determines the privileges (rights) of the user or device. Accounting records the access attempts - both successful and unsuccessful.
Authentication - Authorization - and Accounting (AAA)
Port Address Translation (PAT)
User Datagram Protocol (UDP)
Database
30. An attack technique that tricks your DNS server into believing it has received authentic information when - in reality - it has been provided fraudulent data. DNS cache poisoning affects user traffic by sending it to erroneous or malicious end points
site survey
Corrective Controls
Domain Name System (DNS) cache poisoning
Virtual Private Network (VPN)
31. A partially protected zone on a network - not exposed to the full fury of the Internet - but not fully behind the firewall. This technique is typically used on parts of the network that must remain open to the public (such as a web server) but must a
Accountability
Fraud and related activity in connection with computers
Demilitarized Zone (DMZ)
Wi-Fi Protected Access (WPA)
32. Software code - a portion of data - or sequence of commands intended to take advantage of a bug or vulnerability in order to cause unintended or unanticipated behavior to occur on computer software or hardware.
-sL
Exploit
reconnaissance
overt channel
33. Two or more LANs connected by a high-speed line across a large geographical area.
Master boot record infector
Daemon
Hypertext Transfer Protocol Secure (HTTPS)
Wide Area Network (WAN)
34. Black hat
Hacks without permission
Directory Traversal
Defines legal email marketing
separation of duties
35. An extensible mechanism for e-mail. A variety of MIME types exist for sending content such as audio - binary - or video using the Simple Mail Transfer Protocol (SMTP).
Multipurpose Internet Mail Extensions (MIME)
keylogger
Mandatory access control (MAC)
Collision Domain
36. One or more locations from which control is exercised over a computer - television broadcast - or telecommunications network.
infrastructure mode
hash
--randomize_hosts -O OS fingerprinting
network operations center (NOC)
37. A computer network confined to a relatively small area - such as a single building or campus.
Transport Layer Security (TLS)
local area network (LAN)
Black Hat
ring topology
38. A limit on the amount of time or number of iterations or transmissions in computer and network technology a packet can experience before it will be discarded.
Database
Back orifice
Malware
Time To Live (TTL)
39. ACK Scan
Event
-sA
Tiger Team
-P0
40. The set of all hardware - firmware - and/or software components critical to IT security. Bugs or vulnerabilities occurring inside the TCB might jeopardize the security properties of the entire system.
Trusted Computer Base (TCB)
site survey
operating system attack
service level agreements (SLAs)
41. In computer security - this is an algorithm that uses separate keys for encryption and decryption.
Asymmetric Algorithm
Multipurpose Internet Mail Extensions (MIME)
HTTP
Certificate
42. ICMP Type/Code 11
Authorization
Replacing numbers in a url to access other files
--randomize_hosts -O OS fingerprinting
Time exceeded
43. Port 135
physical security
RPC-DCOM
Sign in Seal
Brute-Force Password Attack
44. A function that is easy to compute in one direction - yet believed to be difficult to compute in the opposite direction (finding its inverse) without special information - called the 'trapdoor.' Widely used in cryptography.
iris scanner
Buffer Overflow
Network Basic Input/Output System (NetBIOS)
Trapdoor Function
45. An unknown deficiency in software or some other product that results in a security vulnerability being identified.
security defect
National Security Agency
Algorithm
Antivirus (AV) software
46. A situation in which an IDS or other sensor triggers on an event as an intrusion attempt - when it was actually legitimate traffic.
Application Layer
security bulletins
false negative
script kiddie
47. A suite of protocols used for securing Internet Protocol (IP) communications by authenticating and encrypting each IP packet of a communication session. This suite includes protocols for establishing mutual authentication between agents at the sessio
-sA
Internet Control Message Protocol (ICMP)
Internet Protocol Security (IPSec) architecture
sniffer
48. An approach to restricting system access to authorized users in which roles are created for various job functions. The permissions to perform certain operations are assigned to specific roles. Members of staff (or other system users) are assigned par
Point-to-Point Protocol (PPP)
Electronic Code Book (ECB)
role-based access control
Mantrap
49. Also known as a public key certificate - this is an electronic file that is used to verify a user's identity - providing non-repudiation throughout the sys-tem. Certificates contain the entity's public key - serial number - version - subject - algori
The automated process of proactively identifying vulnerabilities of computing systems present in a network
Zenmap
hybrid attack
Digital Certificate
50. The rate at which a biometric system will incorrectly reject an access attempt by an authorized user.
self encrypting
spoofing
Algorithm
false rejection rate (FRR)