SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Malicious code that uses a polymorphic engine to mutate while keeping the original algorithm intact; the code changes itself each time it runs - but the function of the code will not change.
Overwhelm CAM table to convert switch to hub mode
Cryptographic Key
polymorphic virus
SYN flood attack
2. A string used for authentication in SNMP. The public community string is used for read-only searches - whereas the private community string is used for read/write. Community strings are transmitted in clear text in SNMPv1. SNMPv3 provides encryption
Malware
Community String
Application Layer
False Acceptance Rate (FAR)
3. An attack that exploits the common mistake many people make when installing operating systems
risk transference
operating system attack
Tumbling
Domain Name System (DNS) cache poisoning
4. Normal scan timing
iris scanner
parallel scan
Due Diligence
infrastructure mode
5. Transmitting one protocol encapsulated inside another protocol.
identity theft
intrusion prevention system (IPS)
Tunneling
Transmission Control Protocol (TCP)
6. The software product or system that is the subject of an evaluation.
End User Licensing Agreement (EULA)
port knocking
Availability
Target Of Engagement (TOE)
7. Port 22
Challenge Handshake Authentication Protocol (CHAP)
SSH
Asynchronous
Internet Protocol (IP)
8. The process of recording activity on a system for monitoring and later review.
encapsulation
Virtual Local Area Network (VLAN)
Finding a directory listing and gaining access to a parent or root file for access to other files
Auditing
9. A communications protocol used for browsing the Internet.
Zone transfer
steganography
limitation of liability and remedies
Hypertext Transfer Protocol (HTTP)
10. Start of Authority record. This record identifies the primary name server for the zone. The SOA record contains the host name of the server responsible for all DNS records within the namespace - as well as the basic properties of the domain.
gray hat
Cryptography
remote procedure call (RPC)
SOA record
11. A TCP flag notifying an originating station that the preceding packet (or packets) has been received.
Echo Reply
Tunnel
Acknowledgment (ACK)
Archive
12. A utility that traces a packet from your computer to an Internet host - showing how many hops the packet takes to reach the host and how long the packet requires to complete the hop.
Network Address Translation (NAT)
ECHO reply
Anonymizer
Traceroute
13. A wireless networking mode where all clients connect to the wireless network through a central access point.
Dumpster Diving
infrastructure mode
International Organization for Standardization (ISO)
Asset
14. Cracking Tools
John the Ripper - LOphtcrack - Ophtcrack - Cain and Abel
Asynchronous
FTP
Audit Trail
15. A malicious computer program with self-replication capabilities that attaches to another file and moves with the host from one computer to another.
inference attack
The automated process of proactively identifying vulnerabilities of computing systems present in a network
Virus
Lightweight Directory Access Protocol (LDAP)
16. TCP Ping
security controls
-PT
Filter
impersonation
17. An HTTP command to transmit text to a web server for processing. The opposite of an HTTP GET.
false rejection rate (FRR)
Virtual Private Network (VPN)
POST
Competitive Intelligence
18. Literally - 'not balanced or the same.' In computing - asymmetric refers to a difference in networking speeds upstream to downstream. In cryptography - it's the use of more than one key for encryption/authentication purposes.
net use \[target ip]IPC$ '' /user:''
Asymmetric
patch
packet filtering
19. A formal set of rules describing data transmission - especially across a network. A protocol determines the type of error checking - the data compression method - how the sending device will indicate completion - how the receiving device will indicat
protocol
A
Virus
Challenge Handshake Authentication Protocol (CHAP)
20. A method for detecting malicious code on a computer where the files are compared to signatures of known viruses stored in a database.
signature scanning
Information Technology (IT) security architecture and framework
Extensible Authentication Protocol (EAP)
packet
21. Layer 2 of the OSI reference model. This layer provides reliable transit of data across a physical link. The Data Link layer is concerned with physical addressing - network topology - access to the network medium - error detection - sequential delive
Zombie
Fiber Distributed Data Interface (FDDI)
Data Link layer
intrusion prevention system (IPS)
22. Baseband LAN specification developed by Xerox Corporation - Intel - and Digital Equipment Corporation. One of the least expensive - most widely deployed networking standards; uses the CSMA/CD method of media access control.
intranet
Ethernet
smart card
self encrypting
23. A free - open source version of the Berkeley Software Distribution of Unix - often used in embedded systems.
Cloning
Decryption
NetBSD
-sI
24. An information assurance strategy in which multiple layers of defense are placed throughout an Information Technology system.
stateful packet filtering
Defense in Depth
penetration testing
DNS enumeration
25. The process of using easily accessible DNS records to map a target network's internal hosts.
DNS enumeration
site survey
Decryption
script kiddie
26. An unknown deficiency in software or some other product that results in a security vulnerability being identified.
net use \[target ip]IPC$ '' /user:''
security defect
social engineering
security kernel
27. An approach to restricting system access to authorized users in which roles are created for various job functions. The permissions to perform certain operations are assigned to specific roles. Members of staff (or other system users) are assigned par
Uniform Resource Locator (URL)
Zone transfer
Extensible Authentication Protocol (EAP)
role-based access control
28. A security protocol for wireless local area networks defined in the 802.11b standard; intended to provide the same level of security as a wired LAN. WEP is not considered strong security - although it does authenticate clients to access points - encr
Wired Equivalent Privacy (WEP)
Timestamping
White Box Testing
Hacks without permission
29. A unit of information formatted according to specific protocols that allows precise transmittal of data from one network node to another. Also called a datagram or data packet - a packet contains a header (container) and a payload (contents). Any IP
Collision Domain
packet
hardware keystroke logger
NetBus
30. A system used by the Securities and Exchange Commission (SEC) for companies and businesses to transmit required filings and information. The EDGAR database performs automated collection - validation - indexing - acceptance - and forwarding of submiss
Point-to-Point Tunneling Protocol (PPTP)
Availability
Authentication
EDGAR database
31. A NAT method in which multiple internal hosts - using private IP addressing - can be mapped through a single public IP address using the session IDs and port numbers. An internal global IP address can support in excess of 65 -000 concurrent TCP and U
Port Address Translation (PAT)
-oX
payload
Serial Line Internet Protocol (SLIP)
32. Vulnerability Scanning
Internal access to the network
pattern matching
The automated process of proactively identifying vulnerabilities of computing systems present in a network
Certificate
33. An Application layer protocol used by local email clients to retrieve e-mail from a remote server over a TCP/IP connection.
Ethernet
Post Office Protocol 3 (POP3)
Hierarchical File System (HFS)
out-of-band signaling
34. Shifting responsibility from one party to another
promiscuous mode
risk transference
routed protocol
Sign in Seal
35. A nonnumerical - subjective risk evaluation. Used with qualitative assessment (an evaluation of risk that results in ratings of none - low - medium - and high for the probability.)
human-based social engineering
Fast Ethernet
RPC-DCOM
qualitative analysis
36. An announcement - typically from a software vendor - of a known security vulnerability in a program; often the bulletin contains instructions for the application of a software patch.
Timestamping
security bulletins
-oN
Trusted Computer System Evaluation Criteria (TCSEC)
37. The means by which a recipient of a message can ensure the identity of the sender and that neither party can deny having sent or received the message. The most common method is through digital certificates.
non-repudiation
Temporal Key Integrity Protocol (TKIP)
separation of duties
EDGAR database
38. A systematic process for the assessment of security vulnerabilities.
Client
limitation of liability and remedies
Time To Live (TTL)
INFOSEC Assessment Methodology (IAM)
39. A self-replicating malicious program that attempts installation beneath antivirus software by directly intercepting the interrupt handlers of the operating system to evade detection.
Time To Live (TTL)
Tunneling Virus
A
Denial of Service (DoS)
40. An attacker who breaks into computer systems with malicious intent - without the owner's knowledge or permission.
forwarding
Black Hat
Post Office Protocol 3 (POP3)
Trapdoor Function
41. Paranoid scan timing
serial scan & 300 sec wait
serialize scans & 0.4 sec wait
Block Cipher
Transmission Control Protocol (TCP)
42. A value assigned to uniquely identify a single wide area network (WAN) in wireless LANs. SSIDs are broadcast by default - and are sent in the header of every packet. SSIDs provide no encryption or security.
Bug
CNAME record
net use \[target ip]IPC$ '' /user:''
Service Set Identifier (SSID)
43. Metamorphic Virus
Certificate
Self Replicating
scope creep
Mantrap
44. Malware designed to install some sort of virus - backdoor - and so on - on a target system.
Droppers
service level agreements (SLAs)
Malicious code
intrusion detection system (IDS)
45. White box test
private network address
Internal access to the network
Network Address Translation (NAT)
Address Resolution Protocol (ARP) table
46. Using conversation or some other interaction between people to gather useful information.
Self Replicating
signature scanning
human-based social engineering
queue
47. A situation in which an IDS or other sensor triggers on an event as an intrusion attempt - when it was actually legitimate traffic.
A S
false negative
Real application encompassing Trojan
Anonymizer
48. Black box test
No previous knowledge of the network
Simple Mail Transfer Protocol (SMTP)
SYN flood attack
honeypot
49. A list of IP addresses and corresponding MAC addresses stored on a local computer.
Cracker
Address Resolution Protocol (ARP) table
Copyright
Routing Protocol
50. A background process found in Unix - Linux - Solaris - and other Unix-based operating systems.
Daemon
Multipartite virus
Application Layer
hash
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests