SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. IP Protocol Scan
-sO
Routing Protocol
Virus Hoax
risk avoidance
2. The default network authentication suite of protocols for Windows NT 4.0
NT LAN Manager (NTLM)
Data Encryption Standard (DES)
physical security
Local Administrator
3. A set of rules defined to screen network packets based on source address - destination address - or protocol; these rules determine whether the packet will be forwarded or discarded.
remote access
infrastructure mode
Filter
parallel scan
4. Sending packets or requests to another system to gain information to be used to identify weaknesses and protect the system from attacks.
Vulnerability Scanning
Brute-Force Password Attack
-sV
Threat
5. An extensible mechanism for e-mail. A variety of MIME types exist for sending content such as audio - binary - or video using the Simple Mail Transfer Protocol (SMTP).
Multipurpose Internet Mail Extensions (MIME)
sidejacking
Virus
Zero Subnet
6. A physical security attack where the attacker sifts through garbage and recycle bins for information that may be useful on current and future attacks
Annualized Loss Expectancy (ALE)
Asymmetric Algorithm
Echo Reply
Dumpster Diving
7. The conveying of official access or legal power to a person or entity.
National Security Agency
Authorization
Active Attack
protocol stack
8. Hex 10
asynchronous transmission
Tiger Team
A
Target Of Engagement (TOE)
9. A limited-function version of the Internetworking Operating System (IOS) - held in read-only memory in some earlier models of Cisco devices - capable of performing several seldom-needed low-level functions such as loading a new IOS into Flash memory
Contingency Plan
Lightweight Directory Access Protocol (LDAP)
RxBoot
serial scan & 300 sec wait
10. A method for detecting malicious code on a computer where the files are compared to signatures of known viruses stored in a database.
protocol stack
Asymmetric Algorithm
signature scanning
Vulnerability Scanning
11. A type of encryption where the same key is used to encrypt and decrypt the message.
symmetric encryption
fully qualified domain name (FQDN)
False Acceptance Rate (FAR)
remote procedure call (RPC)
12. The software product or system that is the subject of an evaluation.
key exchange protocol
Cookie
Target Of Engagement (TOE)
Port Address Translation (PAT)
13. An Application layer protocol used primarily by Microsoft Windows to provide shared access to printers - files - and serial ports. It also provides an authenticated interprocess communication mechanism.
Common Internet File System/Server Message Block
Finger
CAM table
net use \[target ip]IPC$ '' /user:''
14. A derogatory term used to describe an attacker - usually new to the field - who uses simple - easy-to-follow scripts or programs developed by others to attack computer systems and networks and deface websites.
script kiddie
shrink-wrap code attacks
network operations center (NOC)
Request for Comments (RFC)
15. Policy stating what users of a system can and cannot do with the organization's assets.
service level agreements (SLAs)
Exposure Factor
Acceptable Use Policy (AUP)
rogue access point
16. A hybrid of the HTTP and SSL/TLS protocols that provides encrypted communication and secure identification of a web server.
phishing
social engineering
Accountability
Hypertext Transfer Protocol Secure (HTTPS)
17. A document describing information security guidelines - policies - procedures - and standards.
Adware
-oG
Information Technology (IT) security architecture and framework
Archive
18. A hardware device used to log keystrokes covertly. Hardware keystroke loggers are very dangerous due to the fact that they cannot be detected through regular software/anti-malware scanning.
hardware keystroke logger
Denial of Service (DoS)
Tunneling
Zombie
19. FTP Bounce Attack
security controls
-b
Cache
Algorithm
20. A security protocol used in IEEE 802.11i to replace WEP without the requirement to replace legacy hardware.
Simple Network Management Protocol (SNMP)
Temporal Key Integrity Protocol (TKIP)
Vulnerability Scanning
Threat
21. A protocol that uses a private key to encrypt data before transmitting confidential documents over the Internet; widely used on e-commerce - banking - and other sites requiring privacy.
false rejection rate (FRR)
NOP
Secure Sockets Layer (SSL)
Digital Signature
22. A nonnumerical - subjective risk evaluation. Used with qualitative assessment (an evaluation of risk that results in ratings of none - low - medium - and high for the probability.)
Mantrap
Collision
encryption
qualitative analysis
23. A secret - typically consisting of only decimal digits - that a claimant memorizes and uses to authenticate his identity
personal identification number (PIN)
limitation of liability and remedies
Tunneling
site survey
24. The level of importance assigned to an IT asset
Information Technology (IT) asset criticality
Simple Mail Transfer Protocol (SMTP)
queue
Dumpster Diving
25. A Canonical Name record within DNS - used to provide an alias for a domain name.
Back orifice
Boot Sector Virus
qualitative analysis
CNAME record
26. A method used to prevent IDS detection by dividing the request into multiple parts that are sent in different packets
Authentication - Authorization - and Accounting (AAA)
Audit Data
session splicing
Port Address Translation (PAT)
27. A record showing which user has accessed a given resource and what operations the user performed during a given period.
Detective Controls
honeynet
Audit Trail
Level III assessment
28. A command used in HTTP and FTP to retrieve a file from a server.
security defect
single loss expectancy (SLE)
GET
iris scanner
29. An unknown deficiency in software or some other product that results in a security vulnerability being identified.
Methodology
flood
Lightweight Directory Access Protocol (LDAP)
security defect
30. A nontechnical method of hacking. Social engineering is the art of manipulating people - whether in person (human-based) or via computing methods (computer-based) - into providing sensitive information.
Ethernet
Digital Certificate
Zero Subnet
social engineering
31. A storage buffer that transparently stores data so future requests for the same data can be served faster.
Level I assessment
Information Technology (IT) infrastructure
Cache
script kiddie
32. A TCP flag notifying an originating station that the preceding packet (or packets) has been received.
honeynet
Back orifice
Acknowledgment (ACK)
quality of service (QoS)
33. An attack in which a hacker steps between two ends of an already-established communication session and uses specialized tools to guess sequence numbers to take over the channel.
Bit Flipping
Database
session hijacking
parallel scan & 300 sec timeout & 1.25 sec/probe
34. A software program for remotely controlling a Microsoft Windows computer system over a network. Generally considered malware.
parallel scan & 75 sec timeout & 0.3 sec/probe
Multipartite virus
spam
NetBus
35. An Application layer protocol for managing devices on an IP network.
parallel scan & 300 sec timeout & 1.25 sec/probe
intrusion prevention system (IPS)
Post Office Protocol 3 (POP3)
Simple Network Management Protocol (SNMP)
36. An evaluation consisting of a document review - interviews - and demonstrations - as well as vulnerability scans and hands-on testing.
Address Resolution Protocol (ARP) table
Level II assessment
inference attack
passive attack
37. A point of reference used to mark an initial state in order to manage change.
security bulletins
Baseline
FTP
-oX
38. A security tool designed to protect a system or network against attacks by comparing traffic patterns against a list of both known attack signatures and general characteristics of how attacks may be carried out. Threats are rated and reported.
National Security Agency
initial sequence number (ISN)
risk assessment
intrusion detection system (IDS)
39. A network traffic management technique designed to allow applications to specify the route a packet will take to a destination - regardless of what the route tables between the two systems say.
source routing
Telnet
Internet Assigned Number Authority (IANA)
Hacks with permission
40. A protocol for exchanging packets over a serial line.
Block Cipher
Antivirus (AV) software
halo effect
Serial Line Internet Protocol (SLIP)
41. LM Hash for short passwords (under 7)
Hierarchical File System (HFS)
404EE
Information Technology (IT) infrastructure
-PI
42. Attacks on the actual programming code of an application.
Application-Level Attacks
phishing
Master boot record infector
ECHO reply
43. An environmentally conditioned workspace partially equipped with IT and telecommunications equipment to support relocated IT operations in the event of a significant disruption.
-PT
Warm Site
Bug
Lightweight Directory Access Protocol (LDAP)
44. An Application layer protocol used by local email clients to retrieve e-mail from a remote server over a TCP/IP connection.
SAM
Man-in-the-middle attack
smart card
Post Office Protocol 3 (POP3)
45. A comparison metric for different biometric devices and technologies; the point at which the false acceptance rate (FAR) equals the
role-based access control
Macro virus
Crossover Error Rate (CER)
Destination Unreachable
46. Authentication confirms the identity of the user or device. Authorization determines the privileges (rights) of the user or device. Accounting records the access attempts - both successful and unsuccessful.
Timestamping
Due Diligence
Authentication - Authorization - and Accounting (AAA)
router
47. Terminal Access Controller Access-Control System. A remote authentication protocol that is used to communicate with an authentication server commonly used in Unix networks.
Fiber Distributed Data Interface (FDDI)
Minimum acceptable level of risk
TACACS
logic bomb
48. A card with a built-in microprocessor and memory used for identification or financial transactions. The card transfers data to and from a central computer when inserted into a reader.
smart card
Time Bomb
remote procedure call (RPC)
firewalking
49. Occurs when authorized users accumulate excess privileges on a system due to moving from position to position.
LDAP
Address Resolution Protocol (ARP)
route
Access Creep
50. Port 161/162
Due Diligence
SNMP
-P0
null session
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests