SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A file system used by the Mac OS.
operating system attack
firewalking
Hierarchical File System (HFS)
port knocking
2. A wireless networking mode where all clients connect to the wireless network through a central access point.
phishing
infrastructure mode
sidejacking
Temporal Key Integrity Protocol (TKIP)
3. Attacks on the actual programming code of an application.
Application-Level Attacks
NetBus
Authorization
security defect
4. A derogatory term used to describe an attacker - usually new to the field - who uses simple - easy-to-follow scripts or programs developed by others to attack computer systems and networks and deface websites.
hacktivism
script kiddie
intranet
Fast Ethernet
5. Controlling access to a network by analyzing the headers of incoming and outgoing packets - and letting them pass or discarding them based on rule sets created by a network administrator. A packet filter allows or denies packets based on destination
Bit Flipping
802.11
-sA
packet filtering
6. The organization that governs the Internet's top-level domains - IP address allocation - and port number assignments.
Exploit
R
Internet Assigned Number Authority (IANA)
Information Technology (IT) security architecture and framework
7. Layer 6 of the OSI reference model. The Presentation layer ensures information sent by the Application layer of the sending system will be readable by the Application layer of the receiving system.
Presentation layer
NetBSD
Institute of Electrical and Electronics Engineers (IEEE)
Cold Site
8. The means by which a recipient of a message can ensure the identity of the sender and that neither party can deny having sent or received the message. The most common method is through digital certificates.
protocol stack
non-repudiation
CAM table
Baseline
9. A query and response protocol widely used for querying databases that store the registered users or assignees of an Internet resource - such as a domain name - an IP address - or an autonomous system.
Whois
Videocipher II Satellite Encryption System
Copyright
Buffer Overflow
10. A method of external testing whereby several systems or resources are used together to effect an attack.
Virus
Daisy Chaining
Information Technology (IT) asset valuation
Archive
11. An Internet Protocol Security (IPSec) header used to verify that the contents of a packet have not been modified while the packet was in transit.
Internet Assigned Number Authority (IANA)
Decryption
RPC-DCOM
Authentication Header (AH)
12. A standard developed to enable routers to exchange messages containing information about routes to reach subnets in the network.
NetBus
false negative
GET
Routing Protocol
13. The act of searching for Wi-Fi wireless networks by a person in a moving vehicle - using a portable device.
Tunnel
heuristic scanning
War Driving
hybrid attack
14. A type of malware that covertly collects information about a user.
security controls
spyware
gray box testing
Audit Data
15. Any network incident that prompts some kind of log entry or other notification.
Digital Certificate
Event
service level agreements (SLAs)
File Allocation Table (FAT)
16. A method of falsely identifying the source of data packets; often used by hackers to make it difficult to trace where an attack originated.
SOA record
spoofing
Asset
payload
17. The potential for damage to or loss of an IT asset
risk
Detective Controls
Worm
Videocipher II Satellite Encryption System
18. Defined in RFC 826 - ARP is a protocol used to map a known IP address to a physical (MAC) address.
Address Resolution Protocol (ARP)
Cache
Covert Channel
Due Diligence
19. The last portion of the SID that identifies the user to the system in Windows. A RID of 500 identifies the administrator account.
Baseline
encryption
-PS
RID Resource identifier
20. A social-engineering effort in which the attacker pretends to be an employee - a valid user - or even an executive to elicit information or access.
Boot Sector Virus
impersonation
XOR Operation
-sL
21. A utility that traces a packet from your computer to an Internet host - showing how many hops the packet takes to reach the host and how long the packet requires to complete the hop.
Client
Access Control List (ACL)
Traceroute
Tunnel
22. A business - government agency - or educational institution that provides access to the Internet.
spoofing
passive attack
Internet service provider (ISP)
Finger
23. An electronic version of junk mail. Unsolicited commercial e-mail sent to numerous recipients.
spam
Black Box Testing
Authentication Header (AH)
Application Layer
24. A symmetric - block-cipher data-encryption standard that uses a variablelength key that can range from 32 bits to 448 bits.
Internet Control Message Protocol (ICMP)
Blowfish
Open System Interconnection (OSI) Reference Model
Transport Layer Security (TLS)
25. The cyclical practice of identifying - classifying - remediating - and mitigating vulnerabilities.
802.11
Access Point (AP)
reverse lookup; reverse DNS lookup
Vulnerability Management
26. A social-engineering attack using computer resources - such as e-mail or IRC.
hashing algorithm
No previous knowledge of the network
Asymmetric Algorithm
Computer-Based Attack
27. Ping Scan
audit
Hierarchical File System (HFS)
-sP
-b
28. A method of network traffic filtering that monitors the entire communications process - including the originator of the session and from which direction it started.
DNS
stateful packet filtering
Directory Traversal
-b
29. Transmitting one protocol encapsulated inside another protocol.
intrusion detection system (IDS)
physical security
Whois
Tunneling
30. A brand name of analog scrambling and de-scrambling equipment for cable and satellite television - invented primarily to keep consumer Television receive-only (TVRO) satellite equipment from receiving TV programming except on a subscription basis.
RPC-DCOM
Videocipher II Satellite Encryption System
operating system attack
SNMP
31. A set of related communications protocols operating together as a group to address communication at some or all of the seven layers of the OSI reference model.
firewalking
Annualized Loss Expectancy (ALE)
protocol stack
nslookup
32. A network traffic management technique designed to allow applications to specify the route a packet will take to a destination - regardless of what the route tables between the two systems say.
Certificate
-oN
source routing
Authorization
33. A principle in security engineering that attempts to use anonymity and secrecy (of design - implementation - and so on) to provide security; the footprint of the organization - entity - network - or system is kept as small as possible to avoid intere
User Datagram Protocol (UDP)
Network Address Translation (NAT)
Password Authentication Protocol (PAP)
security by obscurity
34. A hacking method for stealing the cookies used during a session build and replaying them for unauthorized connection purposes.
sidejacking
Collision
script kiddie
Web Spider
35. A device set up to send a response on behalf of an end node to the requesting host. Proxies are generally used to obfuscate the host from the Internet.
remote access
Corrective Controls
Bit Flipping
proxy server
36. Controls internal to a system designed to resolve vulnerabilities and errors soon after they arise.
Corrective Controls
Asynchronous
Vulnerability Scanning
Digital Watermarking
37. Normal scan timing
parallel scan
scope creep
Rijndael
rootkit
38. A term representing the responsibility managers and their organizations have to provide information security to ensure the type of control - the cost of control - and the deployment of control are appropriate for the system being managed.
Service Set Identifier (SSID)
Lightweight Directory Access Protocol (LDAP)
Due Care
enumeration
39. Wrapper or Binder
segment
Real application encompassing Trojan
Last In First Out (LIFO)
gap analysis
40. A wireless access point that has either been installed on a secure company network without explicit authorization from a local network administrator - or has been created to allow a hacker to conduct a man-in-the-middle attack.
Secure Sockets Layer (SSL)
Web Spider
rogue access point
Application Layer
41. A remote control program in which the client runs on a local computer and connects to a remote server on a network. Commands entered locally are executed on the remote system.
Zero Subnet
Uniform Resource Locator (URL)
Telnet
pattern matching
42. A host designed to collect data on suspicious activity.
Three-Way (TCP) Handshake
Asymmetric Algorithm
U P F
honeypot
43. Phases of an attack
parallel scan & 300 sec timeout & 1.25 sec/probe
Transmission Control Protocol (TCP)
Reconnaissance - Scanning - Gaining Access - Maintaining Access - Covering Tracks
HTTP
44. Insane scan timing
Bluetooth
Possession of access devices
Domain Name System (DNS) cache poisoning
parallel scan & 75 sec timeout & 0.3 sec/probe
45. Ports 20/21
FTP
public key
source routing
security incident response team (SIRT)
46. A one-way mathematical function that generates a fixedlength numerical string (hash) from a given data input. MD5 and SHA-1 are hashing algorithms.
reconnaissance
Acceptable Use Policy (AUP)
INFOSEC Assessment Methodology (IAM)
hashing algorithm
47. The act of dialing all numbers within an organization to discover open modems.
War Dialing
-sR
NetBus
Timestamping
48. An API that provides services related to the OSI model's Session layer - allowing applications on separate computers to communicate over a LAN.
Open System Interconnection (OSI) Reference Model
Network Basic Input/Output System (NetBIOS)
Telnet
Cold Site
49. A method of evaluating the security of a computer system or network by simulating an attack from a malicious source.
penetration testing
fully qualified domain name (FQDN)
DNS
Time To Live (TTL)
50. The monetary value expected from the occurrence of a risk on an asset. It is mathematically expressed as single loss expectancy (SLE) = asset value (AV)
single loss expectancy (SLE)
Master boot record infector
NetBSD
serialize scans & 0.4 sec wait
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests