SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Port 23
Corrective Controls
Telnet
Level III assessment
-P0
2. A method used to prevent IDS detection by dividing the request into multiple parts that are sent in different packets
Virtual Local Area Network (VLAN)
Daisy Chaining
session splicing
Certificate
3. Controlling access to a network by analyzing the headers of incoming and outgoing packets - and letting them pass or discarding them based on rule sets created by a network administrator. A packet filter allows or denies packets based on destination
packet filtering
iris scanner
Hacks without permission
A S
4. An application that monitors a computer or network to identify - and prevent - malware. AV is usually signature-based - and can take multiple actions on defined malware files/activity.
Black Hat
Tumbling
Antivirus (AV) software
A procedure for identifying active hosts on a network.
5. An attack against an authentication protocol in which the attacker intercepts data in transit along the network between the claimant and verifier - but does not alter the data (in other words - eavesdropping).
passive attack
CAM table
Ethernet
Information Technology (IT) security architecture and framework
6. A proprietary - open - wireless technology used for transferring data from fixed and mobile devices over short distances.
security by obscurity
-sA
Bluetooth
-sL
7. A protocol that uses a private key to encrypt data before transmitting confidential documents over the Internet; widely used on e-commerce - banking - and other sites requiring privacy.
Secure Sockets Layer (SSL)
Level I assessment
Information Technology (IT) security architecture and framework
Due Diligence
8. A virus designed to infect the master boot record.
hot site
Cryptography
enumeration
Master boot record infector
9. Shifting responsibility from one party to another
Multipartite virus
footprinting
quantitative risk assessment
risk transference
10. 18 U.S.C. 1030
Active Attack
Fraud and related activity in connection with computers
Password Authentication Protocol (PAP)
honeynet
11. A cell phone attack in which the serial number from one cell phone is copied to another in an effort to copy the cell phone.
DNS
FreeBSD
serialize scans & 15 sec wait
Cloning
12. ICMP Type/Code 0-0
null session
Electronic Code Book (ECB)
out-of-band signaling
Echo Reply
13. Physical socket provided on routers and switches for cable connections between a computer and the router/switch. This connection enables the computer to configure - query - and troubleshoot the router/switch by use of a terminal emulator and a comman
self encrypting
overt channel
Filter
Console Port
14. A hacker who aims to bring down critical infrastructure for a 'cause' and does not worry about the penalties associated with his actions.
suicide hacker
Telnet
routed protocol
-sV
15. A connectionless - layer 4 transport protocol. UDP is faster than TCP - but offers no reliability. A best effort is made to deliver the data - but no checks and verifications are performed to guarantee delivery. Therefore - UDP is termed a 'connectio
remote procedure call (RPC)
rogue access point
User Datagram Protocol (UDP)
port knocking
16. The process of embedding information into a digital signal in a way that makes it difficult to remove.
integrity
Digital Watermarking
Timestamping
Brute-Force Password Attack
17. Black hat
Wi-Fi
Hacks without permission
-sS
Information Technology Security Evaluation Criteria (ITSEC)
18. Access by information systems (or users) communicating from outside the information system security perimeter.
Presentation layer
remote access
Three-Way (TCP) Handshake
asynchronous transmission
19. A symmetric key cryptographic algorithm that transforms a block of information at a time using a cryptographic key. For a block cipher algorithm - the length of the input block is the same as the length of the output block.
Block Cipher
Black Hat
Access Control List (ACL)
security defect
20. An Application layer protocol for managing devices on an IP network.
firewalking
Bluesnarfing
Simple Network Management Protocol (SNMP)
Hacks without permission
21. Confidentiality - Integrity - and Availability are the three aspects of security and make up the triangle.
Cache
CIA triangle
-sV
Post Office Protocol 3 (POP3)
22. Using conversation or some other interaction between people to gather useful information.
human-based social engineering
Traceroute
Digital Watermarking
personal identification number (PIN)
23. A hacking method for stealing the cookies used during a session build and replaying them for unauthorized connection purposes.
White Box Testing
Copyright
Cryptographic Key
sidejacking
24. Incremental Substitution
false negative
private key
Denial of Service (DoS)
Replacing numbers in a url to access other files
25. A utility that traces a packet from your computer to an Internet host - showing how many hops the packet takes to reach the host and how long the packet requires to complete the hop.
NOP
spoofing
EDGAR database
Traceroute
26. The set of all hardware - firmware - and/or software components critical to IT security. Bugs or vulnerabilities occurring inside the TCB might jeopardize the security properties of the entire system.
Trusted Computer Base (TCB)
Audit Trail
CIA triangle
Assessment
27. A person or entity indirectly involved in a relationship between two principles.
Third Party
Kerberos
Mandatory access control (MAC)
Common Internet File System/Server Message Block
28. A standard for encrypting and authenticating MIME data; used primarily for Internet e-mail.
A S
hybrid attack
passive attack
Secure Multipurpose Mail Extension (S/MIME)
29. Port 88
Web Spider
Kerberos
Ethernet
-sS
30. nmap all output
Destination Unreachable
asynchronous transmission
INFOSEC Assessment Methodology (IAM)
-oA
31. A legal limit on the amount of financial liability and remedies the organization is responsible for taking on.
limitation of liability and remedies
Data Link layer
HIDS
SNMP
32. Layer 2 of the OSI reference model. This layer provides reliable transit of data across a physical link. The Data Link layer is concerned with physical addressing - network topology - access to the network medium - error detection - sequential delive
John the Ripper - LOphtcrack - Ophtcrack - Cain and Abel
-PT
Countermeasures
Data Link layer
33. A VPN tunneling protocol with encryption. PPTP connects two nodes in a VPN by using one TCP port for negotiation and authentication and one IP protocol for data transfer.
Packet Internet Groper (ping)
Decryption
Asset
Point-to-Point Tunneling Protocol (PPTP)
34. Phases of an attack
Reconnaissance - Scanning - Gaining Access - Maintaining Access - Covering Tracks
Bit Flipping
self encrypting
Self Replicating
35. An early network application that provides information on users currently logged on to a machine.
Finger
Uniform Resource Locator (URL)
spyware
Google hacking
36. The Security Accounts Manager file in Windows stores all the password hashes for the system.
Antivirus (AV) software
Target Of Engagement (TOE)
SAM
Institute of Electrical and Electronics Engineers (IEEE)
37. A structured set of criteria for evaluating computer security within products and systems produced by European countries; it has been largely replaced by the Common Criteria.
Interior Gateway Protocol (IGP)
Virus Hoax
security breach or security incident
Information Technology Security Evaluation Criteria (ITSEC)
38. A method of defining what rights and permissions an entity has to a given resource. In networking - Access Control Lists are commonly associated with firewall and router traffic filtering rules.
Cookie
404EE
Warm Site
Access Control List (ACL)
39. A software or hardware application or device that captures user keystrokes.
Collision Domain
keylogger
shrink-wrap code attacks
U P F
40. A standard developed to enable routers to exchange messages containing information about routes to reach subnets in the network.
routed protocol
Biometrics
Time To Live (TTL)
Routing Protocol
41. Activities to determine the extent to which a security control is implemented correctly - operating as intended - and producing the desired outcome with respect to meeting the security requirements for the system.
Assessment
self encrypting
fragmentation
Real application encompassing Trojan
42. PI and PT Ping
-PB
iris scanner
Cracker
Smurf attack
43. The monetary value expected from the occurrence of a risk on an asset. It is mathematically expressed as single loss expectancy (SLE) = asset value (AV)
identity theft
ECHO reply
Echo Reply
single loss expectancy (SLE)
44. The process of recording activity on a system for monitoring and later review.
Exploit
Address Resolution Protocol (ARP)
packet
Auditing
45. A symmetric - block-cipher data-encryption standard that uses a variablelength key that can range from 32 bits to 448 bits.
Digital Watermarking
SID
Blowfish
RID Resource identifier
46. A background process found in Unix - Linux - Solaris - and other Unix-based operating systems.
symmetric algorithm
A R
Daemon
802.11 i
47. A social-engineering effort in which the attacker pretends to be an employee - a valid user - or even an executive to elicit information or access.
Access Creep
Tunneling
impersonation
penetration testing
48. A Unix-like computer operating system descending from the BSD. Open-BSD includes a number of security features absent or optional in other operating systems.
OpenBSD
Client
infrastructure mode
Asymmetric Algorithm
49. A step-by-step method of solving a problem. In computing security - an algorithm is a set of mathematical rules (logic) for the process of encryption and decryption
Lightweight Directory Access Protocol (LDAP)
RxBoot
Algorithm
rogue access point
50. A number assigned during TCP startup sessions that tracks how much information has been moved. This number is used by hackers when hijacking sessions.
initial sequence number (ISN)
iris scanner
Buffer
SYN flood attack