SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Any network incident that prompts some kind of log entry or other notification.
payload
-sL
gateway
Event
2. An anonymous connection to an administrative share (IPC$) on a Windows machine. Null sessions allow for enumeration of Windows machines - among other attacks.
-p <port ranges>
null session
R
Demilitarized Zone (DMZ)
3. Drawing symbols in public places to alert others to an open Wi-Fi network. War chalking can include the SSIDs - administrative passwords to APs - and other information.
parallel scan & 300 sec timeout & 1.25 sec/probe
RPC-DCOM
-oA
War Chalking
4. The combination of all IT assets - resources - components - and systems.
Assessment
hashing algorithm
Information Technology (IT) infrastructure
Man-in-the-middle attack
5. The process of sending a packet or frame toward the destination. In a switch - messages are forwarded only to the port they are addressed to.
Algorithm
Finding a directory listing and gaining access to a parent or root file for access to other files
Network Basic Input/Output System (NetBIOS)
forwarding
6. The process of a system providing a fully qualified domain name (FQDN) to a local name server - for resolution to its corresponding IP address.
Domain Name System (DNS) lookup
-sR
Replacing numbers in a url to access other files
NOP
7. A string used for authentication in SNMP. The public community string is used for read-only searches - whereas the private community string is used for read/write. Community strings are transmitted in clear text in SNMPv1. SNMPv3 provides encryption
Written Authorization
Defines legal email marketing
physical security
Community String
8. A protocol defining packets that are able to be routed by a router.
Routing Protocol
CAM table
routed protocol
Replacing numbers in a url to access other files
9. A suite of protocols used for securing Internet Protocol (IP) communications by authenticating and encrypting each IP packet of a communication session. This suite includes protocols for establishing mutual authentication between agents at the sessio
Authentication - Authorization - and Accounting (AAA)
network interface card (NIC)
SNMP
Internet Protocol Security (IPSec) architecture
10. Security measures - such as a locked door - perimeter fence - or security guard - to prevent or deter physical access to a facility - resource - or information stored on physical media.
physical security
Fraud and related activity in connection with computers
Overwhelm CAM table to convert switch to hub mode
Hypertext Transfer Protocol Secure (HTTPS)
11. A standard that provides best-practice recommendations on information security management for use by those responsible for initiating - implementing - or maintaining Information Security Management Systems (ISMS). Information security is defined with
Auditing
-PB
Three-Way (TCP) Handshake
ISO 17799
12. An application that monitors a computer or network to identify - and prevent - malware. AV is usually signature-based - and can take multiple actions on defined malware files/activity.
Antivirus (AV) software
Threat
Discretionary Access Control (DAC)
Biometrics
13. A nonroutable IP address range intended for use only within the confines of a single organization - falling within the predefined ranges of 10.0.0.0 - 172.16-31.0.0 - or 192.168.0.0.
Baseline
encryption
parameter tampering
private network address
14. A mode of operation in a wireless LAN in which clients send data directly to one another without utilizing a wireless access point (WAP) - much like a point-to-point wired connection.
802.11
Authentication Header (AH)
ad hoc mode
-PI
15. Polymorphic Virus
Block Cipher
Tunneling
self encrypting
symmetric algorithm
16. Originally an extension of PPP - this is a protocol for authentication used within wireless networks. Works with multiple authentication measures.
quality of service (QoS)
Ethernet
Digital Watermarking
Extensible Authentication Protocol (EAP)
17. A set of related communications protocols operating together as a group to address communication at some or all of the seven layers of the OSI reference model.
Filter
network interface card (NIC)
protocol stack
-oX
18. The directory service created by Microsoft for use on itsnetworks. Provides a variety of network services using Lightweight Directory Access Protocol (LDAP) - Kerberos-based authentication - and single sign-on for user access to network-based resourc
Active Directory (AD)
SMB
sheepdip
Redundant Array of Independent Disks (RAID)
19. A routing protocol developed to be used within a single organization.
Interior Gateway Protocol (IGP)
-sW
File Allocation Table (FAT)
Backdoor
20. A security protocol used in IEEE 802.11i to replace WEP without the requirement to replace legacy hardware.
Temporal Key Integrity Protocol (TKIP)
symmetric algorithm
hashing algorithm
Tunneling Virus
21. A condition that occurs when more data is written to a buffer than it has space to store - and results in data corruption or other system errors. This is usually due to insufficient bounds checking - a bug - or improper configuration in the program c
Defines legal email marketing
stateful packet filtering
Uniform Resource Locator (URL)
Buffer Overflow
22. Software code - a portion of data - or sequence of commands intended to take advantage of a bug or vulnerability in order to cause unintended or unanticipated behavior to occur on computer software or hardware.
Pretty Good Privacy (PGP)
Corrective Controls
802.11
Exploit
23. A firewall evasion technique whereby packets are wrapped in HTTP - as a covert channel to the target.
War Dialing
HTTP tunneling
Daisy Chaining
Mandatory access control (MAC)
24. A small space having two sets of interlocking doors; the first set of doors must close before the second set opens. Typically authentication is required for each door - often using different factors. For example - a smart card may open the first door
Mantrap
Virus Hoax
symmetric encryption
asynchronous transmission
25. An attack in which a hacker steps between two ends of an already-established communication session and uses specialized tools to guess sequence numbers to take over the channel.
CAM table
Hacks without permission
Point-to-Point Protocol (PPP)
session hijacking
26. A value used to control cryptographic operations - such as decryption -encryption - signature generation - and signature verification.
Cryptographic Key
gray hat
gateway
port redirection
27. Name given to expert groups that handle computer security incidents.
Lightweight Directory Access Protocol (LDAP)
Serial Line Internet Protocol (SLIP)
risk avoidance
Computer Emergency Response Team (CERT)
28. A text file stored within a browser by a web server that maintains information about the connection. Cookies are used to store information to maintain a unique but consistent surfing experience - but can also contain authentication parameters. Cookie
pattern matching
Cookie
GET
Ethernet
29. don't ping
False Acceptance Rate (FAR)
Audit Data
risk transference
-P0
30. Hex 29
U P F
physical security
Filter
Videocipher II Satellite Encryption System
31. 18 U.S.C. 1030
Defines legal email marketing
Fraud and related activity in connection with computers
Cloning
integrity
32. A group of people - gathered together by a business entity - working to address a specific problem or goal.
risk assessment
Tiger Team
-sP
Whois
33. ICMP Type/Code 0-0
-sV
serialize scans & 15 sec wait
HIDS
Echo Reply
34. A type of malware that covertly collects information about a user.
spyware
Distributed DoS (DDoS)
spam
Interior Gateway Protocol (IGP)
35. An attack that combines a brute-force attack with a dictionary attack.
Presentation layer
POP 3
hybrid attack
FreeBSD
36. A number assigned during TCP startup sessions that tracks how much information has been moved. This number is used by hackers when hijacking sessions.
Data Encryption Standard (DES)
initial sequence number (ISN)
personal identification number (PIN)
Warm Site
37. A query and response protocol widely used for querying databases that store the registered users or assignees of an Internet resource - such as a domain name - an IP address - or an autonomous system.
CNAME record
rootkit
Whois
Mandatory access control (MAC)
38. A set of rules defined to screen network packets based on source address - destination address - or protocol; these rules determine whether the packet will be forwarded or discarded.
Possession of access devices
Information Technology Security Evaluation Criteria (ITSEC)
Filter
Network Address Translation (NAT)
39. Port 110
protocol stack
protocol
POP 3
port knocking
40. Hex 10
Bastion host
Interior Gateway Protocol (IGP)
A
Trusted Computer System Evaluation Criteria (TCSEC)
41. A stand-alone computer - kept off the network - that is used for scanning potentially malicious media or software.
File Transfer Protocol (FTP)
Information Technology (IT) asset criticality
sheepdip
firewalking
42. The cyclical practice of identifying - classifying - remediating - and mitigating vulnerabilities.
Vulnerability Management
Authentication
network interface card (NIC)
Uniform Resource Locator (URL)
43. A non-self-replicating program that appears to have a useful purpose - but in reality has a different - malicious purpose.
Tiger Team
Cloning
RID Resource identifier
Trojan Horse
44. A partially protected zone on a network - not exposed to the full fury of the Internet - but not fully behind the firewall. This technique is typically used on parts of the network that must remain open to the public (such as a web server) but must a
hashing algorithm
Internet Protocol Security (IPSec) architecture
Demilitarized Zone (DMZ)
Collision Domain
45. A business - government agency - or educational institution that provides access to the Internet.
Internet service provider (ISP)
null session
Bit Flipping
-PP
46. As an identification device becomes more sensitive or accurate - its FAR decreases while its FRR increases. The CER is the point at which these two rates are equal - or cross over.
Electronic serial number
Transmission Control Protocol (TCP)
false rejection rate (FRR)
identity theft
47. A social-engineering attack using computer resources - such as e-mail or IRC.
Computer-Based Attack
overt channel
Echo request
INFOSEC Assessment Methodology (IAM)
48. A software or hardware defect that often results in system vulnerabilities.
Bug
Asymmetric
False Acceptance Rate (FAR)
passive attack
49. Activities to determine the extent to which a security control is implemented correctly - operating as intended - and producing the desired outcome with respect to meeting the security requirements for the system.
Assessment
Domain Name System (DNS)
Master boot record infector
-PS
50. A Canonical Name record within DNS - used to provide an alias for a domain name.
Trusted Computer System Evaluation Criteria (TCSEC)
CNAME record
Point-to-Point Tunneling Protocol (PPTP)
Zone transfer