SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Controls internal to a system designed to resolve vulnerabilities and errors soon after they arise.
Corrective Controls
Virtual Local Area Network (VLAN)
Tunneling
Sign in Seal
2. Unauthorized access to information such as a calendar - contact list - e-mails - and text messages on a wireless device through a Bluetooth connection.
intranet
War Driving
Bastion host
Bluesnarfing
3. A standard for encrypting and authenticating MIME data; used primarily for Internet e-mail.
FTP
-sO
Secure Multipurpose Mail Extension (S/MIME)
Kerberos
4. List Scan
integrity
-sL
Tunnel
Defines legal email marketing
5. The organization that governs the Internet's top-level domains - IP address allocation - and port number assignments.
Written Authorization
heuristic scanning
protocol
Internet Assigned Number Authority (IANA)
6. A program or piece of code inserted into a system - usually covertly - with the intent of compromising the confidentiality - integrity - or availability of the victim's data - applications - or operating system. Malware consists of viruses - worms -
Malware
Bluesnarfing
Third Party
gray box testing
7. A type of DNS transfer - where all records from an SOA are transmitted to the requestor. Zone transfers have two options: full (opcode AXFR) and incremental (IXFR).
Zone transfer
Temporal Key Integrity Protocol (TKIP)
Internet Protocol Security (IPSec) architecture
-oA
8. A network traffic management technique designed to allow applications to specify the route a packet will take to a destination - regardless of what the route tables between the two systems say.
Timestamping
POP 3
source routing
pattern matching
9. A piece of code intentionally inserted into a software system that will perform a malicious function when specified conditions are met at some future point.
red team
Echo request
logic bomb
pattern matching
10. Literally - 'not balanced or the same.' In computing - asymmetric refers to a difference in networking speeds upstream to downstream. In cryptography - it's the use of more than one key for encryption/authentication purposes.
Asymmetric
security kernel
qualitative analysis
sheepdip
11. Provides router-to-router or host-to-network connections over asynchronous and synchronous circuits.
Hacks without permission
Point-to-Point Protocol (PPP)
FreeBSD
secure channel
12. A virus designed to infect the master boot record.
Trusted Computer System Evaluation Criteria (TCSEC)
patch
Defense in Depth
Master boot record infector
13. Attacks on the actual programming code of an application.
Application-Level Attacks
packet
Cracker
Common Internet File System/Server Message Block
14. A set of exclusive rights granted by the law of a jurisdiction to the author or creator of an original work - including the right to copy - distribute - and adapt the work.
Interior Gateway Protocol (IGP)
MD5
Copyright
Zombie
15. The act or actions of a hacker to put forward a cause or a political agenda - to affect some societal change - or to shed light on something he feels to be political injustice. These activities are usually illegal in nature.
iris scanner
hacktivism
Exploit
Wide Area Network (WAN)
16. A portion of memory used to temporarily store output or input data.
NOP
Event
Contingency Plan
Buffer
17. Physical socket provided on routers and switches for cable connections between a computer and the router/switch. This connection enables the computer to configure - query - and troubleshoot the router/switch by use of a terminal emulator and a comman
Virus Hoax
Console Port
Computer Emergency Response Team (CERT)
firewalking
18. Layer 2 of the OSI reference model. This layer provides reliable transit of data across a physical link. The Data Link layer is concerned with physical addressing - network topology - access to the network medium - error detection - sequential delive
Biometrics
stateful packet filtering
CNAME record
Data Link layer
19. Metamorphic Virus
integrity
Self Replicating
hot site
-sW
20. A U.S. Department of Defense (DoD) standard that sets basic requirements for assessing the effectiveness of computer security controls built into a computer system.
Trusted Computer System Evaluation Criteria (TCSEC)
Transmission Control Protocol (TCP)
Finger
hashing algorithm
21. Paranoid scan timing
FreeBSD
serial scan & 300 sec wait
CNAME record
A series of messages sent by someone attempting to break into a computer to learn about the computer's network services.
22. The act of searching for Wi-Fi wireless networks by a person in a moving vehicle - using a portable device.
War Driving
Hacks with permission
shoulder surfing
404EE
23. Conversion of plaintext to ciphertext through the use of a cryptographic algorithm.
encryption
Assessment
parallel scan & 300 sec timeout & 1.25 sec/probe
Wired Equivalent Privacy (WEP)
24. A wireless access point that has either been installed on a secure company network without explicit authorization from a local network administrator - or has been created to allow a hacker to conduct a man-in-the-middle attack.
-p <port ranges>
Trusted Computer System Evaluation Criteria (TCSEC)
Secure Multipurpose Mail Extension (S/MIME)
rogue access point
25. An enumeration technique used to provide information about a computer system; generally used for operating system identification (also known as fingerprinting).
Time exceeded
Network Address Translation (NAT)
Banner Grabbing
Auditing
26. Steps taken to identify and limit risks to an acceptable or reasonable level of exposure.
Due Diligence
serialize scans & 0.4 sec wait
NetBSD
session hijacking
27. Port 53
Information Technology Security Evaluation Criteria (ITSEC)
SSH
Trusted Computer Base (TCB)
DNS
28. A cryptographic attack where bits are manipulated in the ciphertext itself to generate a predictable outcome in the plaintext once it is decrypted.
SYN attack
local area network (LAN)
limitation of liability and remedies
Bit Flipping
29. A query and response protocol widely used for querying databases that store the registered users or assignees of an Internet resource - such as a domain name - an IP address - or an autonomous system.
encryption
Authentication
Whois
Smurf attack
30. The process of embedding information into a digital signal in a way that makes it difficult to remove.
overt channel
Active Fingerprinting
Digital Watermarking
DNS
31. Transmission using channels or frequencies outside those normally used for data transfer; often used for error reporting.
Computer Emergency Response Team (CERT)
Bug
Mantrap
out-of-band signaling
32. A security tool designed to protect a system or network against attacks by comparing traffic patterns against a list of both known attack signatures and general characteristics of how attacks may be carried out. Threats are rated and protective measu
Trusted Computer System Evaluation Criteria (TCSEC)
Point-to-Point Protocol (PPP)
intrusion prevention system (IPS)
Defines legal email marketing
33. An attack that exploits the common mistake many people make when installing operating systems
operating system attack
Wiretapping
spyware
Authorization
34. The combination of all IT assets - resources - components - and systems.
Archive
piggybacking
Information Technology (IT) infrastructure
Internet Control Message Protocol (ICMP)
35. Polymorphic Virus
SYN flood attack
self encrypting
National Security Agency
session hijacking
36. Start of Authority record. This record identifies the primary name server for the zone. The SOA record contains the host name of the server responsible for all DNS records within the namespace - as well as the basic properties of the domain.
SOA record
RxBoot
role-based access control
hot site
37. The concept of having more than one person required to complete a task
passive attack
port scanning
key exchange protocol
separation of duties
38. An organized collection of data.
MD5
Backdoor
ad hoc mode
Database
39. A hybrid of the HTTP and SSL/TLS protocols that provides encrypted communication and secure identification of a web server.
Hypertext Transfer Protocol Secure (HTTPS)
Rijndael
segment
Wi-Fi Protected Access (WPA)
40. An information assurance strategy in which multiple layers of defense are placed throughout an Information Technology system.
network access server
port scanning
-sF
Defense in Depth
41. An e-mail message warning users of a nonexistent virus and encouraging them to pass on the message to other users.
Virus Hoax
separation of duties
Echo Reply
Port Address Translation (PAT)
42. Occurs when authorized users accumulate excess privileges on a system due to moving from position to position.
Directory Traversal
False Acceptance Rate (FAR)
Asymmetric Algorithm
Access Creep
43. Security measures - such as a locked door - perimeter fence - or security guard - to prevent or deter physical access to a facility - resource - or information stored on physical media.
physical security
A R
Macro virus
risk assessment
44. ICMP Type/Code 3-13
Time Bomb
Denial of Service (DoS)
-oX
Administratively Prohibited
45. Devices - connected to one or more switches - grouped logically into a single broadcast domain. VLANs enable administrators to divide the devices connected to the switches into multiple VLANs without requiring separate physical switches.
spyware
Virtual Local Area Network (VLAN)
network interface card (NIC)
-sX
46. A Unix-like computer operating system descending from the BSD. Open-BSD includes a number of security features absent or optional in other operating systems.
-sF
Uniform Resource Locator (URL)
security controls
OpenBSD
47. Xmas Tree scan
Malware
Syslog
Cold Site
-sX
48. A malicious computer program with self-replication capabilities that attaches to another file and moves with the host from one computer to another.
Virus
Address Resolution Protocol (ARP) table
Cloning
National Security Agency
49. ICMP Type/Code 3
rootkit
signature scanning
Bastion host
Destination Unreachable
50. Weakness in an information system - system security procedures - internal controls - or implementation that could be exploited or triggered by a threat source.
service level agreements (SLAs)
Vulnerability
hardware keystroke logger
False Acceptance Rate (FAR)