SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. An HTTP command to transmit text to a web server for processing. The opposite of an HTTP GET.
-oX
-sR
POST
Zenmap
2. A string that represents the location of a web resource
Uniform Resource Locator (URL)
Internet Protocol (IP)
National Security Agency
quantitative risk assessment
3. The ability to trace actions performed on a system to a specific user or system entity.
Data Link layer
Finger
Packet Internet Groper (ping)
Accountability
4. A unit of information formatted according to specific protocols that allows precise transmittal of data from one network node to another. Also called a datagram or data packet - a packet contains a header (container) and a payload (contents). Any IP
promiscuous mode
gray hat
packet
Google hacking
5. The cyclical practice of identifying - classifying - remediating - and mitigating vulnerabilities.
Vulnerability Management
Database
open source
fully qualified domain name (FQDN)
6. One or more locations from which control is exercised over a computer - television broadcast - or telecommunications network.
National Security Agency
802.11
network operations center (NOC)
Port Address Translation (PAT)
7. Shifting responsibility from one party to another
null session
human-based social engineering
Adware
risk transference
8. The level of importance assigned to an IT asset
Cryptography
serial scan & 300 sec wait
Information Technology (IT) asset criticality
Self Replicating
9. Paranoid scan timing
serial scan & 300 sec wait
Worm
Information Technology (IT) security architecture and framework
polymorphic virus
10. An outdated symmetric cipher encryption algorithm - previously U.S. government-approved and used by business and civilian government agencies. DES is no longer considered secure due to the ease with which the entire keyspace can be attempted using mo
Bit Flipping
Timestamping
Data Encryption Standard (DES)
SID
11. Port 31337
-sU
Back orifice
HTTP tunneling
-PB
12. A backlog of packets stored in buffers and waiting to be forwarded over an interface.
Uniform Resource Locator (URL)
queue
security defect
quality of service (QoS)
13. A system used by the Securities and Exchange Commission (SEC) for companies and businesses to transmit required filings and information. The EDGAR database performs automated collection - validation - indexing - acceptance - and forwarding of submiss
Annualized Loss Expectancy (ALE)
EDGAR database
Ethernet
Secure Multipurpose Mail Extension (S/MIME)
14. A U.S. Department of Defense (DoD) standard that sets basic requirements for assessing the effectiveness of computer security controls built into a computer system.
RID Resource identifier
Trusted Computer System Evaluation Criteria (TCSEC)
Virtual Private Network (VPN)
security breach or security incident
15. Port 137/138/139
intrusion detection system (IDS)
Bluejacking
Time exceeded
SMB
16. A piece of software - provided by the vendor - intended to update or fix known - discovered problems in a computer program or its supporting data.
physical security
Biometrics
patch
Covert Channel
17. The contents of a packet. A system attack requires the attacker to deliver a malicious payload that is acted upon and executed by the system.
ad hoc mode
payload
Dumpster Diving
FTP
18. A fully operational off-site data-processing facility equipped with hardware and system software to be used in the event of a disaster.
-sW
Black Hat
Asset
hot site
19. A trusted entity that issues and revokes public key certificates. In a network - a CA is a trusted entity that issues - manages - and revokes security credentials and public keys for message encryption and/or authentication. Within a public key infra
SYN attack
Computer-Based Attack
Certificate Authority (CA)
Warm Site
20. All measures and techniques taken to gather information about an intended target. Footprinting can be passive or active.
Sign in Seal
-oA
footprinting
port scanning
21. A wireless access point that has either been installed on a secure company network without explicit authorization from a local network administrator - or has been created to allow a hacker to conduct a man-in-the-middle attack.
Defines legal email marketing
halo effect
Presentation layer
rogue access point
22. The combination of all IT assets - resources - components - and systems.
Bastion host
Uniform Resource Locator (URL)
Information Technology (IT) infrastructure
--randomize_hosts -O OS fingerprinting
23. A method of permitting only MAC addresses in a preapproved list network access. Addresses not matching are blocked.
polymorphic virus
Domain Name System (DNS)
MAC filtering
Bluetooth
24. Provides router-to-router or host-to-network connections over asynchronous and synchronous circuits.
Domain Name System (DNS) lookup
Local Administrator
Point-to-Point Protocol (PPP)
Defines legal email marketing
25. A three-step process computers execute to negotiate a connection with one another. The three steps are SYN - SYN/ACK - ACK.
International Organization for Standardization (ISO)
HIDS
Network Address Translation (NAT)
Three-Way (TCP) Handshake
26. Layer 6 of the OSI reference model. The Presentation layer ensures information sent by the Application layer of the sending system will be readable by the Application layer of the receiving system.
Presentation layer
Virtual Local Area Network (VLAN)
halo effect
-oX
27. Authentication confirms the identity of the user or device. Authorization determines the privileges (rights) of the user or device. Accounting records the access attempts - both successful and unsuccessful.
spoofing
Authentication - Authorization - and Accounting (AAA)
route
Demilitarized Zone (DMZ)
28. The directory service created by Microsoft for use on itsnetworks. Provides a variety of network services using Lightweight Directory Access Protocol (LDAP) - Kerberos-based authentication - and single sign-on for user access to network-based resourc
Active Directory (AD)
session hijacking
Defines legal email marketing
Hierarchical File System (HFS)
29. An attacker who breaks into computer systems with malicious intent - without the owner's knowledge or permission.
human-based social engineering
Demilitarized Zone (DMZ)
shrink-wrap code attacks
Black Hat
30. An Ethernet networking system transmitting data at 100 million bits per second (Mbps) - 10 times the speed of an earlier Ethernet standard. Derived from the Ethernet 802.3 standard - it is also known as 100BaseT.
Asymmetric Algorithm
Fast Ethernet
Audit Trail
Hacks without permission
31. A systematic process for the assessment of security vulnerabilities.
halo effect
-PM
INFOSEC Assessment Methodology (IAM)
Asynchronous
32. The process of embedding information into a digital signal in a way that makes it difficult to remove.
routed protocol
Digital Watermarking
-oX
Last In First Out (LIFO)
33. Port 135
single loss expectancy (SLE)
Tumbling
RPC-DCOM
Echo request
34. RPC Scan
-sR
XOR Operation
Bluesnarfing
Request for Comments (RFC)
35. An organized collection of data.
impersonation
Database
-sA
Client
36. A card with a built-in microprocessor and memory used for identification or financial transactions. The card transfers data to and from a central computer when inserted into a reader.
smart card
Bluejacking
private network address
risk acceptance
37. TCP Ping
rootkit
-PT
risk acceptance
Transmission Control Protocol (TCP)
38. Policy stating what users of a system can and cannot do with the organization's assets.
-sA
Discretionary Access Control (DAC)
LDAP
Acceptable Use Policy (AUP)
39. A computer network confined to a relatively small area - such as a single building or campus - in which devices connect through high-frequency radio waves using IEEE standard 802.11.
site survey
EDGAR database
Wireless Local Area Network (WLAN)
Internet Control Message Protocol (ICMP)
40. A sublayer of layer 2 of the OSI model - the Data Link layer. It provides addressing and channel access control mechanisms that enable several terminals or network nodes to communicate within a multipoint network.
Media Access Control (MAC)
hashing algorithm
Google hacking
SSH
41. A set of rules defined to screen network packets based on source address - destination address - or protocol; these rules determine whether the packet will be forwarded or discarded.
Authentication - Authorization - and Accounting (AAA)
Administratively Prohibited
Filter
false rejection rate (FRR)
42. Using conversation or some other interaction between people to gather useful information.
Corrective Controls
human-based social engineering
Internet Assigned Number Authority (IANA)
packet filtering
43. Microsoft SID 500
risk acceptance
session splicing
Local Administrator
social engineering
44. In computer security - this is an algorithm that uses separate keys for encryption and decryption.
Asymmetric Algorithm
A S
Trusted Computer Base (TCB)
hot site
45. A hacker who aims to bring down critical infrastructure for a 'cause' and does not worry about the penalties associated with his actions.
promiscuous mode
suicide hacker
Service Set Identifier (SSID)
hot site
46. Port 110
Cloning
POP 3
risk avoidance
qualitative analysis
47. Text or data in its encrypted form; the result of plaintext being input into a cryptographic algorithm.
Confidentiality
Ciphertext
Temporal Key Integrity Protocol (TKIP)
Pretty Good Privacy (PGP)
48. The process of systematically testing each port on a firewall to map rules and determine accessible ports.
reverse lookup; reverse DNS lookup
symmetric encryption
shoulder surfing
firewalking
49. A command that instructs the system processor to do nothing. Many overflow attacks involve stringing several NOP operations together (known as a NOP sled).
NOP
signature scanning
Common Internet File System/Server Message Block
symmetric algorithm
50. Polite scan timing
serialize scans & 0.4 sec wait
Droppers
Countermeasures
route
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests