SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A penetration test in which the ethical hacker has limited knowledge of the intended target(s). Designed to simulate an internal - but non-systemadministrator-level attack.
NetBus
separation of duties
gray box testing
initial sequence number (ISN)
2. A social-engineering attack using computer resources - such as e-mail or IRC.
net use \[target ip]IPC$ '' /user:''
Active Directory (AD)
local area network (LAN)
Computer-Based Attack
3. A symmetric - block-cipher data-encryption standard that uses a variablelength key that can range from 32 bits to 448 bits.
XOR Operation
private network address
SMB
Blowfish
4. A method of external testing whereby several systems or resources are used together to effect an attack.
Hacks with permission
Macro virus
Vulnerability Management
Daisy Chaining
5. A self-replicating - self-propagating - self-contained program that uses networking mechanisms to spread itself.
risk avoidance
Worm
Level III assessment
Request for Comments (RFC)
6. A wireless LAN security standard developed by IEEE. Requires Temporal Key Integrity Protocol (TKIP) and Advanced Encryption Standard (AES).
Tini
802.11 i
scope creep
War Driving
7. A simple PPP authentication mechanism in which the user name and password are transmitted in clear text to prove identity. PAP compares the user name and password to a table listing authorized users.
self encrypting
A procedure for identifying active hosts on a network.
Password Authentication Protocol (PAP)
-sT
8. A cryptographic attack where bits are manipulated in the ciphertext itself to generate a predictable outcome in the plaintext once it is decrypted.
Bit Flipping
ISO 17799
Digital Watermarking
Defines legal email marketing
9. A computer security expert who performs security audits and penetration tests against systems or network segments - with the owner's full knowledge and permission - in an effort to increase security.
Denial of Service (DoS)
symmetric algorithm
Ethical Hacker
halo effect
10. Attacks that take advantage of the built-in code and scripts most off-the-shelf applications come with.
shrink-wrap code attacks
-sR
self encrypting
Request for Comments (RFC)
11. A security tool designed to protect a system or network against attacks by comparing traffic patterns against a list of both known attack signatures and general characteristics of how attacks may be carried out. Threats are rated and reported.
port redirection
Bug
Level II assessment
intrusion detection system (IDS)
12. Another term for firewalking
Self Replicating
OpenBSD
Internal access to the network
port knocking
13. A protocol used for sending and receiving log information for nodes on a network.
Blowfish
Syslog
replay attack
False Acceptance Rate (FAR)
14. A fully operational off-site data-processing facility equipped with hardware and system software to be used in the event of a disaster.
White Box Testing
penetration testing
hot site
Boot Sector Virus
15. A protocol defining packets that are able to be routed by a router.
network interface card (NIC)
Serial Line Internet Protocol (SLIP)
routed protocol
Information Technology Security Evaluation Criteria (ITSEC)
16. The public portion of an asymmetric key pair typically used to encrypt data or verify signatures. Public keys are shared and are used to encrypt messages.
network access server
public key
Routing Information Protocol (RIP)
Data Link layer
17. A security protocol used in IEEE 802.11i to replace WEP without the requirement to replace legacy hardware.
Temporal Key Integrity Protocol (TKIP)
payload
Virtual Private Network (VPN)
Community String
18. Content Addressable Memory table. Holds all the MAC-address-to-port mappings on a switch.
-sA
CAM table
-oN
Tunnel
19. A form of fraud in which someone pretends to be someone else by assuming that person's identity - typically in order to access resources or obtain credit and other benefits in that person's name.
identity theft
risk assessment
Directory Traversal
polymorphic virus
20. Literally - 'not balanced or the same.' In computing - asymmetric refers to a difference in networking speeds upstream to downstream. In cryptography - it's the use of more than one key for encryption/authentication purposes.
risk acceptance
secure channel
Asymmetric
public key infrastructure (PKI)
21. Aggressive scan timing
logic bomb
MD5
parallel scan & 300 sec timeout & 1.25 sec/probe
patch
22. Polymorphic Virus
Hacks without permission
self encrypting
-sS
Bluejacking
23. A TCP flag notifying an originating station that the preceding packet (or packets) has been received.
smart card
risk acceptance
Acknowledgment (ACK)
A S
24. A type of malware that covertly collects information about a user.
key exchange protocol
Internet Control Message Protocol (ICMP)
asynchronous transmission
spyware
25. Attacks on the actual programming code of an application.
Application-Level Attacks
Computer Emergency Response Team (CERT)
Institute of Electrical and Electronics Engineers (IEEE)
overt channel
26. A device set up to send a response on behalf of an end node to the requesting host. Proxies are generally used to obfuscate the host from the Internet.
proxy server
Internet service provider (ISP)
Videocipher II Satellite Encryption System
SMB
27. Incremental Substitution
protocol stack
patch
Replacing numbers in a url to access other files
-oG
28. ICMP Type/Code 3-13
Administratively Prohibited
firewall
RxBoot
reconnaissance
29. A utility that sends an ICMP Echo message to determine if a specific IP address is accessible; if the message receives a reply - the address is reachable.
Post Office Protocol 3 (POP3)
Packet Internet Groper (ping)
firewall
Access Point (AP)
30. An Application layer protocol for sending electronic mail between servers.
Simple Mail Transfer Protocol (SMTP)
-sU
risk
-sT
31. A measurable - physical characteristic used to recognize the identity - or verify the claimed identity - of an applicant. Facial images - fingerprints - and handwriting samples are all examples of biometrics.
Acceptable Use Policy (AUP)
Uniform Resource Locator (URL)
Biometrics
-P0
32. The lack of clocking (imposed time ordering) on a bit stream.
Asynchronous
Threat
Ciphertext
-sR
33. The conveying of official access or legal power to a person or entity.
parallel scan & 300 sec timeout & 1.25 sec/probe
Brute-Force Password Attack
Tunneling
Authorization
34. A portion of memory used to temporarily store output or input data.
DNS enumeration
Buffer
overt channel
Acknowledgment (ACK)
35. A hybrid of the HTTP and SSL/TLS protocols that provides encrypted communication and secure identification of a web server.
Brute-Force Password Attack
Hypertext Transfer Protocol Secure (HTTPS)
rogue access point
-oX
36. A communications channel that is being used for a purpose it was not intended for - usually to transfer information secretly.
Covert Channel
intranet
-sO
Confidentiality
37. don't ping
Wrapper
-P0
piggybacking
Warm Site
38. Formerly Redundant Array of Inexpensive Disks; a technology that provides increased storage functions and reliability through redundancy. This is achieved by combining multiple disk drive components into a logical unit - where data is distributed acr
Redundant Array of Independent Disks (RAID)
SMB
smart card
Malware
39. A U.S. Department of Defense (DoD) standard that sets basic requirements for assessing the effectiveness of computer security controls built into a computer system.
identity theft
integrity
Trusted Computer System Evaluation Criteria (TCSEC)
Cold Site
40. A set of exclusive rights granted by the law of a jurisdiction to the author or creator of an original work - including the right to copy - distribute - and adapt the work.
enumeration
802.11
Copyright
International Organization for Standardization (ISO)
41. A limited-function version of the Internetworking Operating System (IOS) - held in read-only memory in some earlier models of Cisco devices - capable of performing several seldom-needed low-level functions such as loading a new IOS into Flash memory
rule-based access control
Secure Multipurpose Mail Extension (S/MIME)
RxBoot
Daisy Chaining
42. An environmentally conditioned workspace partially equipped with IT and telecommunications equipment to support relocated IT operations in the event of a significant disruption.
Warm Site
End User Licensing Agreement (EULA)
-PI
Port Address Translation (PAT)
43. The security property that data is not modified in an unauthorized and undetected manner. Also - the principle and measures taken to ensure that data received is in the exact same condition and state as when it was originally transmitted.
risk acceptance
integrity
session hijacking
Exposure Factor
44. A denial-of-service attack where the attacker sends a ping to the network's broadcast address from the spoofed IP address of the target. All systems in the subnet then respond to the spoofed address - eventually flooding the device.
Zombie
User Datagram Protocol (UDP)
Kerberos
Smurf attack
45. LAN standard - defined by ANSI X3T9.5 - specifying a 100Mbps token-passing network using fiber-optic cable and a dualring architecture for redundancy - with transmission distances of up to two kilometers.
router
Simple Mail Transfer Protocol (SMTP)
Bluesnarfing
Fiber Distributed Data Interface (FDDI)
46. Two or more LANs connected by a high-speed line across a large geographical area.
Wide Area Network (WAN)
Authorization
POP 3
Warm Site
47. An attack that exploits the common mistake many people make when installing operating systems
operating system attack
Kerberos
Man-in-the-middle attack
Bluejacking
48. A software or hardware application or device that captures user keystrokes.
keylogger
router
shoulder surfing
--randomize_hosts -O OS fingerprinting
49. A class of algorithms for cryptography that use the same cryptographic key for both decryption and encryption.
symmetric algorithm
Wired Equivalent Privacy (WEP)
Directory Traversal
-oA
50. A method of permitting only MAC addresses in a preapproved list network access. Addresses not matching are blocked.
service level agreements (SLAs)
MAC filtering
Extensible Authentication Protocol (EAP)
Block Cipher