SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. An unknown deficiency in software or some other product that results in a security vulnerability being identified.
Application-Level Attacks
Videocipher II Satellite Encryption System
Backdoor
security defect
2. A sublayer of layer 2 of the OSI model - the Data Link layer. It provides addressing and channel access control mechanisms that enable several terminals or network nodes to communicate within a multipoint network.
Time Bomb
Cache
Media Access Control (MAC)
Accountability
3. A string used for authentication in SNMP. The public community string is used for read-only searches - whereas the private community string is used for read/write. Community strings are transmitted in clear text in SNMPv1. SNMPv3 provides encryption
promiscuous mode
Wi-Fi
Community String
Service Set Identifier (SSID)
4. A small Trojan program that listens on port 777.
logic bomb
encapsulation
Tini
Whois
5. Created by the U.S. Federal Communications Commission to uniquely identify mobile devices; often represented as an 11-digit decimal number or eight-digit hexadecimal number.
Electronic serial number
Boot Sector Virus
War Driving
-PS
6. A distance-vector routing protocol that employs the hop count as a routing metric. The 'hold down time -' used to define how long a route is held in memory - is 180 seconds. RIP prevents routing loops by implementing a limit on the number of hops all
Droppers
remote access
Simple Object Access Protocol (SOAP)
Routing Information Protocol (RIP)
7. A configuration of a network card that makes the card pass all traffic it receives to the central processing unit rather than just frames addressed to it
--randomize_hosts -O OS fingerprinting
Request for Comments (RFC)
promiscuous mode
-sS
8. Hex 29
-sU
shoulder surfing
U P F
Access Point (AP)
9. ICMP Type/Code 8
Reconnaissance - Scanning - Gaining Access - Maintaining Access - Covering Tracks
Echo request
Virtual Local Area Network (VLAN)
Sign in Seal
10. Text or data in its encrypted form; the result of plaintext being input into a cryptographic algorithm.
Black Hat
hashing algorithm
-sA
Ciphertext
11. A method in cryptography by which cryptographic keys are exchanged between users - allowing use of a cryptographic algorithm (for example - the Diffie-Hellman key exchange).
self encrypting
reconnaissance
Application-Level Attacks
key exchange protocol
12. ICMP Netmask
packet filtering
Transport Layer Security (TLS)
-PM
hot site
13. Sneaky scan timing
Decryption
serialize scans & 15 sec wait
social engineering
-PI
14. Version Detection Scan
-sV
Demilitarized Zone (DMZ)
Interior Gateway Protocol (IGP)
port redirection
15. Security identifier. The method by which Windows identifies user - group - and computer accounts for rights and permissions.
hybrid attack
SID
No previous knowledge of the network
File Transfer Protocol (FTP)
16. Another term for firewalking
Web Spider
port knocking
CIA triangle
stream cipher
17. A nontechnical method of hacking. Social engineering is the art of manipulating people - whether in person (human-based) or via computing methods (computer-based) - into providing sensitive information.
Wi-Fi
Crossover Error Rate (CER)
Information Technology (IT) asset valuation
social engineering
18. Layer 7 of the OSI reference model. The Application layer provides services to applications - which allow them access to the network. Protocols such as FTP and SMTP reside here.
Rijndael
-oA
User Datagram Protocol (UDP)
Application Layer
19. Malicious code that uses a polymorphic engine to mutate while keeping the original algorithm intact; the code changes itself each time it runs - but the function of the code will not change.
Adware
polymorphic virus
Internet service provider (ISP)
private key
20. An evaluation consisting of a document review - interviews - and demonstrations - as well as vulnerability scans and hands-on testing.
-oG
Vulnerability Assessment
phishing
Level II assessment
21. A computer security expert who performs security audits and penetration tests against systems or network segments - with the owner's full knowledge and permission - in an effort to increase security.
Back orifice
Collision Domain
Ethical Hacker
hybrid attack
22. Traffic-passing technique used by bridges and switches in which traffic received on an interface is sent out all interfaces on the device except the interface on which the information was originally received. Traffic on a switch is flooded when it is
flood
Bit Flipping
Application Layer
port knocking
23. An Internet Protocol Security (IPSec) header used to verify that the contents of a packet have not been modified while the packet was in transit.
node
Authentication Header (AH)
International Organization for Standardization (ISO)
Tiger Team
24. Polite scan timing
open source
Client
serialize scans & 0.4 sec wait
firewalking
25. Process of breaking a packet into smaller units when it is being transmitted over a network medium that's unable to support a transmission unit the original size of the packet.
International Organization for Standardization (ISO)
fragmentation
social engineering
Zero Subnet
26. A computer file system architecture used in Windows - OS/2 - and most memory cards.
promiscuous mode
Web Spider
Wrapper
File Allocation Table (FAT)
27. Freely and readily available information on an organization that can be gathered by a business entity about its competitor's customers - products - and marketing - and can be used by an attacker to build useful information for further attacks.
Port Address Translation (PAT)
Minimum acceptable level of risk
Competitive Intelligence
packet
28. A self-replicating malicious program that attempts installation beneath antivirus software by directly intercepting the interrupt handlers of the operating system to evade detection.
International Organization for Standardization (ISO)
Tunneling Virus
queue
security controls
29. A program designed to browse websites in an automated - methodical manner. Sometimes these programs are used to harvest information from websites - such as e-mail addresses.
-oN
Packet Internet Groper (ping)
stateful packet filtering
Web Spider
30. A method of external testing whereby several systems or resources are used together to effect an attack.
Time Bomb
key exchange protocol
Demilitarized Zone (DMZ)
Daisy Chaining
31. Port 53
pattern matching
Fiber Distributed Data Interface (FDDI)
DNS
Daisy Chaining
32. Controls internal to a system designed to resolve vulnerabilities and errors soon after they arise.
Address Resolution Protocol (ARP) table
Tunneling Virus
-PM
Corrective Controls
33. The rate at which a biometric system will incorrectly identify an unauthorized individual and allow them access (see false negative).
Digital Watermarking
FTP
asynchronous transmission
False Acceptance Rate (FAR)
34. Defined in RFC 826 - ARP is a protocol used to map a known IP address to a physical (MAC) address.
Address Resolution Protocol (ARP)
Collision
risk
Active Directory (AD)
35. A set of rules defined to screen network packets based on source address - destination address - or protocol; these rules determine whether the packet will be forwarded or discarded.
Filter
File Transfer Protocol (FTP)
Time exceeded
Tunneling
36. A computer virus that infects and spreads in multiple ways.
Covert Channel
Time Bomb
Multipartite virus
International Organization for Standardization (ISO)
37. The process of using an application to remotely identify open ports on a system (for example - whether systems allow connections through those ports).
Level III assessment
port scanning
Traceroute
session hijacking
38. Also known as the dot-dot-slash attack. Using directory traversal - the attacker attempts to access restricted directories and execute commands outside intended web server directories by using the URL to redirect to an unintended folder location.
Fast Ethernet
port scanning
Directory Traversal
Buffer Overflow
39. A standard for encrypting and authenticating MIME data; used primarily for Internet e-mail.
Common Internet File System/Server Message Block
Ciphertext
Secure Multipurpose Mail Extension (S/MIME)
Cryptography
40. Port 31337
Back orifice
Redundant Array of Independent Disks (RAID)
Internal access to the network
-sI
41. A trusted entity that issues and revokes public key certificates. In a network - a CA is a trusted entity that issues - manages - and revokes security credentials and public keys for message encryption and/or authentication. Within a public key infra
False Acceptance Rate (FAR)
Transmission Control Protocol (TCP)
ECHO reply
Certificate Authority (CA)
42. The rate at which a biometric system will incorrectly reject an access attempt by an authorized user.
false rejection rate (FRR)
Digital Signature
serialize scans & 0.4 sec wait
Wi-Fi Protected Access (WPA)
43. Used to find the domain name associated with an IP address; the opposite of a DNS lookup.
rootkit
infrastructure mode
out-of-band signaling
reverse lookup; reverse DNS lookup
44. An Application layer protocol used by local email clients to retrieve e-mail from a remote server over a TCP/IP connection.
Common Internet File System/Server Message Block
-sL
physical security
Post Office Protocol 3 (POP3)
45. A portion of memory used to temporarily store output or input data.
human-based social engineering
Trapdoor Function
Buffer
Confidentiality
46. A Canonical Name record within DNS - used to provide an alias for a domain name.
CNAME record
Virus
social engineering
Due Care
47. Hex 10
A
security incident response team (SIRT)
Collision Domain
HIDS
48. Looking over an authorized user's shoulder in order to steal information (such as authentication information).
Information Technology (IT) asset criticality
Tunnel
shoulder surfing
Active Attack
49. Wireless LAN standards created by IEEE. 802.11a runs at up to 54Mbps at 5GHz - 802.11b runs at 11Mbps at 2.4GHz - 802.11g runs at 54Mbps at 2.4GHz - and 802.11n can run upwards of 150MBps.
port redirection
remote procedure call (RPC)
802.11
NOP
50. In a classful IPv4 subnet - this is the network number with all binary 0s in the subnet part of the number. When written in decimal - the zero subnet has the same number as the classful network number.
Zero Subnet
net use \[target ip]IPC$ '' /user:''
-sV
red team