SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A pen testing method where the attacker knows all information about the internal network. It is designed to simulate an attack by a disgruntled systems administrator - or similar level.
OpenBSD
net use \[target ip]IPC$ '' /user:''
White Box Testing
Echo Reply
2. The ability to trace actions performed on a system to a specific user or system entity.
Wrapper
Accountability
Routing Information Protocol (RIP)
Sign in Seal
3. The concept of having more than one person required to complete a task
separation of duties
Lightweight Directory Access Protocol (LDAP)
impersonation
A series of messages sent by someone attempting to break into a computer to learn about the computer's network services.
4. The secret portion of an asymmetric key pair typically used to decrypt or digitally sign data. The private key is never shared and is always used for decryption - with one notable exception: The private key is used to encrypt the digital signature.
-oN
Bit Flipping
Port Address Translation (PAT)
private key
5. A method in cryptography by which cryptographic keys are exchanged between users - allowing use of a cryptographic algorithm (for example - the Diffie-Hellman key exchange).
key exchange protocol
Methodology
Audit Trail
SID
6. A connectionless - layer 4 transport protocol. UDP is faster than TCP - but offers no reliability. A best effort is made to deliver the data - but no checks and verifications are performed to guarantee delivery. Therefore - UDP is termed a 'connectio
intrusion prevention system (IPS)
Kerberos
security bulletins
User Datagram Protocol (UDP)
7. A term trademarked by the Wi-Fi Alliance - used to define a standard for devices to use to connect to a wireless network.
Digital Watermarking
DNS
Wi-Fi
Directory Traversal
8. A wireless LAN security standard developed by IEEE. Requires Temporal Key Integrity Protocol (TKIP) and Advanced Encryption Standard (AES).
Timestamping
Reconnaissance - Scanning - Gaining Access - Maintaining Access - Covering Tracks
identity theft
802.11 i
9. A symmetric key cryptographic algorithm that transforms a block of information at a time using a cryptographic key. For a block cipher algorithm - the length of the input block is the same as the length of the output block.
Bit Flipping
Address Resolution Protocol (ARP) table
Block Cipher
Audit Data
10. Nmap ml output
Baseline
Denial of Service (DoS)
private network address
-oX
11. Policy stating what users of a system can and cannot do with the organization's assets.
Acceptable Use Policy (AUP)
-PB
parallel scan
Active Attack
12. The lack of clocking (imposed time ordering) on a bit stream.
key exchange protocol
Information Technology (IT) asset criticality
overt channel
Asynchronous
13. Port 137/138/139
security bulletins
Collision
Bluetooth
SMB
14. Physical socket provided on routers and switches for cable connections between a computer and the router/switch. This connection enables the computer to configure - query - and troubleshoot the router/switch by use of a terminal emulator and a comman
Console Port
Wide Area Network (WAN)
War Chalking
International Organization for Standardization (ISO)
15. An e-mail message warning users of a nonexistent virus and encouraging them to pass on the message to other users.
Macro virus
routed protocol
Virus Hoax
Wi-Fi
16. A self-replicating malicious program that attempts installation beneath antivirus software by directly intercepting the interrupt handlers of the operating system to evade detection.
Media Access Control (MAC)
Time To Live (TTL)
Tunneling Virus
Network Address Translation (NAT)
17. A piece of code intentionally inserted into a software system that will perform a malicious function when specified conditions are met at some future point.
Exploit
logic bomb
Internet Protocol (IP)
Routing Information Protocol (RIP)
18. A device that receives and sends data packets between two or more networks; the packet headers and a forwarding table provide the router with the information necessary for deciding which interface to use to forward packets.
router
Access Creep
fragmentation
risk assessment
19. A three-step process computers execute to negotiate a connection with one another. The three steps are SYN - SYN/ACK - ACK.
Three-Way (TCP) Handshake
POST
Unicode
replay attack
20. The change or growth of a project's scope
source routing
scope creep
Hypertext Transfer Protocol Secure (HTTPS)
Uniform Resource Locator (URL)
21. A condition that occurs when more data is written to a buffer than it has space to store - and results in data corruption or other system errors. This is usually due to insufficient bounds checking - a bug - or improper configuration in the program c
Tunneling
network interface card (NIC)
Block Cipher
Buffer Overflow
22. A function that is easy to compute in one direction - yet believed to be difficult to compute in the opposite direction (finding its inverse) without special information - called the 'trapdoor.' Widely used in cryptography.
Data Encryption Standard (DES)
-PI
NetBSD
Trapdoor Function
23. Layer 2 of the OSI reference model. This layer provides reliable transit of data across a physical link. The Data Link layer is concerned with physical addressing - network topology - access to the network medium - error detection - sequential delive
Digital Watermarking
Database
Algorithm
Data Link layer
24. A free and popular version of the Unix operating system.
Acknowledgment (ACK)
-sO
network interface card (NIC)
FreeBSD
25. A command used in HTTP and FTP to retrieve a file from a server.
heuristic scanning
GET
Digital Watermarking
Transport Layer Security (TLS)
26. A distance-vector routing protocol that employs the hop count as a routing metric. The 'hold down time -' used to define how long a route is held in memory - is 180 seconds. RIP prevents routing loops by implementing a limit on the number of hops all
Information Technology Security Evaluation Criteria (ITSEC)
False Acceptance Rate (FAR)
logic bomb
Routing Information Protocol (RIP)
27. A computer file system architecture used in Windows - OS/2 - and most memory cards.
File Allocation Table (FAT)
A
Worm
asynchronous transmission
28. The science or study of protecting information - whether in transit or at rest - by using techniques to render the information unusable to anyone who does not possess the means to decrypt it.
Cryptography
Vulnerability Management
serial scan & 300 sec wait
Internet Control Message Protocol (ICMP)
29. A method of network traffic filtering that monitors the entire communications process - including the originator of the session and from which direction it started.
stateful packet filtering
Worm
Point-to-Point Protocol (PPP)
Malicious code
30. Port 22
Redundant Array of Independent Disks (RAID)
SSH
smart card
Digital Watermarking
31. A utility that traces a packet from your computer to an Internet host - showing how many hops the packet takes to reach the host and how long the packet requires to complete the hop.
quality of service (QoS)
Traceroute
quantitative risk assessment
qualitative analysis
32. A type of malware that covertly collects information about a user.
spyware
gray box testing
public key
HIDS
33. A person or entity indirectly involved in a relationship between two principles.
infrastructure mode
User Datagram Protocol (UDP)
Third Party
Confidentiality
34. A method of defining what rights and permissions an entity has to a given resource. In networking - Access Control Lists are commonly associated with firewall and router traffic filtering rules.
security by obscurity
limitation of liability and remedies
Multipurpose Internet Mail Extensions (MIME)
Access Control List (ACL)
35. ICMP Timestamp
RID Resource identifier
-PP
SID
router
36. A set of hardware - software - people - policies - and procedures needed to create - manage - distribute - use - store - and revoke digital certificates.
rootkit
public key infrastructure (PKI)
Bug
penetration testing
37. Also known as the dot-dot-slash attack. Using directory traversal - the attacker attempts to access restricted directories and execute commands outside intended web server directories by using the URL to redirect to an unintended folder location.
Directory Traversal
Destination Unreachable
Information Technology (IT) asset valuation
-sI
38. An organized collection of data.
Database
-sU
operating system attack
Replacing numbers in a url to access other files
39. Software used to bind a Trojan and a legitimate program together so the Trojan will be installed when the legitimate program is executed.
Last In First Out (LIFO)
Interior Gateway Protocol (IGP)
Boot Sector Virus
Wrapper
40. An attack where the hacker repeats a portion of a cryptographic exchange in hopes of fooling the system into setting up a communications channel.
stream cipher
replay attack
risk
Crossover Error Rate (CER)
41. The organization that governs the Internet's top-level domains - IP address allocation - and port number assignments.
Multipartite virus
Post Office Protocol 3 (POP3)
Internet Assigned Number Authority (IANA)
security controls
42. Hex 14
sheepdip
Tumbling
A R
Cryptographic Key
43. Chronological record of system activities to enable the reconstruction and examination of the sequence of events and changes in an event.
remote access
Audit Data
risk avoidance
promiscuous mode
44. A method of falsely identifying the source of data packets; often used by hackers to make it difficult to trace where an attack originated.
Man-in-the-middle attack
spoofing
Vulnerability Scanning
Information Technology (IT) security architecture and framework
45. Security measures - such as a locked door - perimeter fence - or security guard - to prevent or deter physical access to a facility - resource - or information stored on physical media.
suicide hacker
MAC filtering
Asset
physical security
46. A penetration test in which the ethical hacker has limited knowledge of the intended target(s). Designed to simulate an internal - but non-systemadministrator-level attack.
Buffer
gray box testing
port redirection
Tunneling
47. The combination of all IT assets - resources - components - and systems.
Level I assessment
-PT
U P F
Information Technology (IT) infrastructure
48. An Internet routing protocol used to exchange routing information within an autonomous system.
risk acceptance
Information Technology (IT) asset criticality
Interior Gateway Protocol (IGP)
Vulnerability Assessment
49. A command that instructs the system processor to do nothing. Many overflow attacks involve stringing several NOP operations together (known as a NOP sled).
NOP
operating system attack
DNS enumeration
script kiddie
50. FTP Bounce Attack
security kernel
serialize scans & 0.4 sec wait
human-based social engineering
-b