SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Physical socket provided on routers and switches for cable connections between a computer and the router/switch. This connection enables the computer to configure - query - and troubleshoot the router/switch by use of a terminal emulator and a comman
Last In First Out (LIFO)
Digital Certificate
Uniform Resource Locator (URL)
Console Port
2. Devices - connected to one or more switches - grouped logically into a single broadcast domain. VLANs enable administrators to divide the devices connected to the switches into multiple VLANs without requiring separate physical switches.
Time To Live (TTL)
-sW
Virtual Local Area Network (VLAN)
firewalking
3. A systematic process for the assessment of security vulnerabilities.
remote procedure call (RPC)
Sign in Seal
Ethical Hacker
INFOSEC Assessment Methodology (IAM)
4. An information assurance strategy in which multiple layers of defense are placed throughout an Information Technology system.
identity theft
Defense in Depth
smart card
null session
5. ICMP Type/Code 0-0
secure channel
single loss expectancy (SLE)
Google hacking
Echo Reply
6. Normal scan timing
Asymmetric Algorithm
parallel scan
Malware
stream cipher
7. A structured set of criteria for evaluating computer security within products and systems produced by European countries; it has been largely replaced by the Common Criteria.
S
public key
Information Technology Security Evaluation Criteria (ITSEC)
SYN attack
8. In a classful IPv4 subnet - this is the network number with all binary 0s in the subnet part of the number. When written in decimal - the zero subnet has the same number as the classful network number.
Archive
ping sweep
Zero Subnet
private key
9. The public portion of an asymmetric key pair typically used to encrypt data or verify signatures. Public keys are shared and are used to encrypt messages.
public key
Asset
reverse lookup; reverse DNS lookup
Whois
10. Software or firmware intended to perform an unauthorized process that will have an adverse impact on the confidentiality - integrity - or availability of an information system. A virus - worm - Trojan horse - or other code-based entity that infects a
Black Hat
Tunnel
Malicious code
Daisy Chaining
11. A legal limit on the amount of financial liability and remedies the organization is responsible for taking on.
Redundant Array of Independent Disks (RAID)
Point-to-Point Tunneling Protocol (PPTP)
limitation of liability and remedies
scope creep
12. A TCP flag notifying an originating station that the preceding packet (or packets) has been received.
Digital Watermarking
red team
Acknowledgment (ACK)
A R
13. An HTTP command to transmit text to a web server for processing. The opposite of an HTTP GET.
POST
Trojan Horse
Bit Flipping
Internet Protocol (IP)
14. A computer virus that infects and spreads in multiple ways.
Digital Certificate
integrity
Multipartite virus
iris scanner
15. A situation in which an IDS or other sensor triggers on an event as an intrusion attempt - when it was actually legitimate traffic.
Challenge Handshake Authentication Protocol (CHAP)
false negative
risk acceptance
The automated process of proactively identifying vulnerabilities of computing systems present in a network
16. A term trademarked by the Wi-Fi Alliance - used to define a standard for devices to use to connect to a wireless network.
network interface card (NIC)
Wi-Fi
HTTP
Digital Signature
17. Monitoring of telephone or Internet conversations - typically by covert means.
Wiretapping
Worm
logic bomb
NetBus
18. A mode of operation in a wireless LAN in which clients send data directly to one another without utilizing a wireless access point (WAP) - much like a point-to-point wired connection.
router
ad hoc mode
fragmentation
Anonymizer
19. A hacking method for stealing the cookies used during a session build and replaying them for unauthorized connection purposes.
Multipurpose Internet Mail Extensions (MIME)
sidejacking
Sign in Seal
Transport Layer Security (TLS)
20. Terminal Access Controller Access-Control System. A remote authentication protocol that is used to communicate with an authentication server commonly used in Unix networks.
enumeration
Black Box Testing
Bluetooth
TACACS
21. The secret portion of an asymmetric key pair typically used to decrypt or digitally sign data. The private key is never shared and is always used for decryption - with one notable exception: The private key is used to encrypt the digital signature.
impersonation
private key
inference attack
rule-based access control
22. Attacks that take advantage of the built-in code and scripts most off-the-shelf applications come with.
Access Control List (ACL)
Electronic serial number
shrink-wrap code attacks
parallel scan
23. An authentication method on point-to-point links - using a three-way handshake and a mutually agreed-upon key.
Trusted Computer Base (TCB)
Tunneling Virus
Challenge Handshake Authentication Protocol (CHAP)
Exposure Factor
24. A nonroutable IP address range intended for use only within the confines of a single organization - falling within the predefined ranges of 10.0.0.0 - 172.16-31.0.0 - or 192.168.0.0.
Timestamping
private network address
quality of service (QoS)
Level II assessment
25. Establish Null Session
DNS
Access Control List (ACL)
net use \[target ip]IPC$ '' /user:''
Banner Grabbing
26. IP Protocol Scan
-sO
halo effect
serial scan & 300 sec wait
router
27. An Application layer protocol used by local email clients to retrieve e-mail from a remote server over a TCP/IP connection.
Post Office Protocol 3 (POP3)
S
Videocipher II Satellite Encryption System
A series of messages sent by someone attempting to break into a computer to learn about the computer's network services.
28. Nmap normal output
gap analysis
-oN
CIA triangle
hacktivism
29. A cryptographic attack where bits are manipulated in the ciphertext itself to generate a predictable outcome in the plaintext once it is decrypted.
Data Link layer
Electronic Code Book (ECB)
port knocking
Bit Flipping
30. An attack where the hacker positions himself between the client and the server - to intercept (and sometimes alter) data traveling between the two.
Man-in-the-middle attack
Archive
-sP
iris scanner
31. A self-replicating malicious program that attempts installation beneath antivirus software by directly intercepting the interrupt handlers of the operating system to evade detection.
open source
Active Directory (AD)
Tunneling Virus
SNMP
32. An attack technique that tricks your DNS server into believing it has received authentic information when - in reality - it has been provided fraudulent data. DNS cache poisoning affects user traffic by sending it to erroneous or malicious end points
Domain Name System (DNS) cache poisoning
Bluetooth
Routing Protocol
gray box testing
33. The rate at which a biometric system will incorrectly identify an unauthorized individual and allow them access (see false negative).
Tini
False Acceptance Rate (FAR)
sheepdip
Time Bomb
34. Two or more LANs connected by a high-speed line across a large geographical area.
CAM table
Vulnerability Management
Authorization
Wide Area Network (WAN)
35. An announcement - typically from a software vendor - of a known security vulnerability in a program; often the bulletin contains instructions for the application of a software patch.
SMB
security bulletins
Information Technology (IT) security architecture and framework
hash
36. A symmetric key cryptographic algorithm that transforms a block of information at a time using a cryptographic key. For a block cipher algorithm - the length of the input block is the same as the length of the output block.
Possession of access devices
Routing Protocol
-sT
Block Cipher
37. The exploitation of a security vulnerability
FreeBSD
halo effect
security breach or security incident
Malicious code
38. An Application layer protocol for managing devices on an IP network.
operating system attack
Simple Network Management Protocol (SNMP)
intrusion prevention system (IPS)
-sI
39. nmap
spyware
sniffer
firewall
-p <port ranges>
40. A device that receives and sends data packets between two or more networks; the packet headers and a forwarding table provide the router with the information necessary for deciding which interface to use to forward packets.
Simple Mail Transfer Protocol (SMTP)
Assessment
Collision
router
41. A utility that sends an ICMP Echo message to determine if a specific IP address is accessible; if the message receives a reply - the address is reachable.
Mandatory access control (MAC)
Man-in-the-middle attack
Packet Internet Groper (ping)
Mantrap
42. The process of embedding information into a digital signal in a way that makes it difficult to remove.
NT LAN Manager (NTLM)
Digital Watermarking
Dumpster Diving
Kerberos
43. The process of using an application to remotely identify open ports on a system (for example - whether systems allow connections through those ports).
port scanning
802.11 i
Buffer Overflow
source routing
44. A cyber attacker who acts without permission from - and gives prior notice to - the resource owner. Also known as a malicious hacker.
Data Encryption Standard (DES)
null session
Cracker
The automated process of proactively identifying vulnerabilities of computing systems present in a network
45. A file system used by the Mac OS.
Hierarchical File System (HFS)
queue
CAM table
Bluejacking
46. Port 88
Authentication - Authorization - and Accounting (AAA)
802.11 i
Kerberos
Domain Name System (DNS) cache poisoning
47. Originally an extension of PPP - this is a protocol for authentication used within wireless networks. Works with multiple authentication measures.
hash
Confidentiality
Extensible Authentication Protocol (EAP)
A R
48. A type of attack used to deny service to legitimate users of a network resource by intentionally overloading the network with illegitimate TCP connection requests. SYN packets are sent repeatedly to the target - but the corresponding SYN/ACK response
Traceroute
Algorithm
SYN flood attack
POP 3
49. A method in cryptography by which cryptographic keys are exchanged between users - allowing use of a cryptographic algorithm (for example - the Diffie-Hellman key exchange).
key exchange protocol
Echo Reply
Denial of Service (DoS)
Authorization
50. White hat
scope creep
-PS
Hacks with permission
Wi-Fi