SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The change or growth of a project's scope
scope creep
Domain Name
Temporal Key Integrity Protocol (TKIP)
Echo Reply
2. Malicious code that uses a polymorphic engine to mutate while keeping the original algorithm intact; the code changes itself each time it runs - but the function of the code will not change.
polymorphic virus
identity theft
halo effect
Digital Certificate
3. A set of related communications protocols operating together as a group to address communication at some or all of the seven layers of the OSI reference model.
Event
Access Point (AP)
protocol stack
RPC-DCOM
4. NSA
Authentication Header (AH)
POST
CAM table
National Security Agency
5. A widely used authentication protocol developed at the MassachusettsInstitute of Technology (MIT). Kerberos authentication uses tickets - Ticket Granting Service - and Key Distribution Center.
Kerberos
Certificate
Destination Unreachable
Antivirus (AV) software
6. A biometric device that uses pattern-recognition techniques based on images of the irises of an individual's eyes.
iris scanner
Fiber Distributed Data Interface (FDDI)
SSH
Simple Mail Transfer Protocol (SMTP)
7. Originally an extension of PPP - this is a protocol for authentication used within wireless networks. Works with multiple authentication measures.
Wi-Fi
Extensible Authentication Protocol (EAP)
Hypertext Transfer Protocol Secure (HTTPS)
Virus Hoax
8. Physical socket provided on routers and switches for cable connections between a computer and the router/switch. This connection enables the computer to configure - query - and troubleshoot the router/switch by use of a terminal emulator and a comman
Kerberos
Domain Name System (DNS) lookup
Tiger Team
Console Port
9. A technology that establishes a tunnel to create a private - dedicated - leased-line network over the Internet. The data is encrypted so it's readable only by the sender and receiver. Companies commonly use VPNs to allow employees to connect securely
Virtual Private Network (VPN)
Interior Gateway Protocol (IGP)
Competitive Intelligence
Confidentiality
10. A comparison metric for different biometric devices and technologies; the point at which the false acceptance rate (FAR) equals the
XOR Operation
Crossover Error Rate (CER)
packet
Trusted Computer System Evaluation Criteria (TCSEC)
11. The potential for damage to or loss of an IT asset
Kerberos
risk
hashing algorithm
Malware
12. A distance-vector routing protocol that employs the hop count as a routing metric. The 'hold down time -' used to define how long a route is held in memory - is 180 seconds. RIP prevents routing loops by implementing a limit on the number of hops all
DNS enumeration
-sP
Hypertext Transfer Protocol (HTTP)
Routing Information Protocol (RIP)
13. A security tool designed to protect a system or network against attacks by comparing traffic patterns against a list of both known attack signatures and general characteristics of how attacks may be carried out. Threats are rated and reported.
intrusion detection system (IDS)
packet
public key
404EE
14. A security objective that ensures a resource can be accessed only by authorized users. This is also the property that sensitive information is not disclosed to unauthorized individuals - entities - or processes.
Bluejacking
Confidentiality
reverse lookup; reverse DNS lookup
port scanning
15. A group of penetration testers that assess the security of an organization - which is often unaware of the existence of the team or the exact assignment.
Open System Interconnection (OSI) Reference Model
red team
Adware
footprinting
16. A software or hardware application or device that captures user keystrokes.
Black Hat
Copyright
keylogger
impersonation
17. The default network authentication suite of protocols for Windows NT 4.0
-sA
Wide Area Network (WAN)
NT LAN Manager (NTLM)
Lightweight Directory Access Protocol (LDAP)
18. Black box test
SYN attack
-oA
No previous knowledge of the network
remote procedure call (RPC)
19. A structured set of criteria for evaluating computer security within products and systems produced by European countries; it has been largely replaced by the Common Criteria.
Replacing numbers in a url to access other files
Information Technology Security Evaluation Criteria (ITSEC)
intrusion prevention system (IPS)
social engineering
20. A form of fraud in which someone pretends to be someone else by assuming that person's identity - typically in order to access resources or obtain credit and other benefits in that person's name.
identity theft
route
symmetric algorithm
limitation of liability and remedies
21. Baseband LAN specification developed by Xerox Corporation - Intel - and Digital Equipment Corporation. One of the least expensive - most widely deployed networking standards; uses the CSMA/CD method of media access control.
Point-to-Point Protocol (PPP)
Target Of Engagement (TOE)
Redundant Array of Independent Disks (RAID)
Ethernet
22. The ability to trace actions performed on a system to a specific user or system entity.
EDGAR database
session hijacking
Finding a directory listing and gaining access to a parent or root file for access to other files
Accountability
23. Normal scan timing
parallel scan
Assessment
single loss expectancy (SLE)
payload
24. Evaluation in which testers attempt to penetrate the network.
parallel scan & 75 sec timeout & 0.3 sec/probe
Level III assessment
Countermeasures
War Dialing
25. Also known as a digital certificate - this is an electronic file used to verify a user's identity - providing non-repudiation throughout the system It is also a set of data that uniquely identifies an entity. Certificates contain the entity's public
public key
Bluetooth
Certificate
Internet Assigned Number Authority (IANA)
26. A computer file system architecture used in Windows - OS/2 - and most memory cards.
Tiger Team
File Allocation Table (FAT)
hash
packet
27. Also known as a public key certificate - this is an electronic file that is used to verify a user's identity - providing non-repudiation throughout the sys-tem. Certificates contain the entity's public key - serial number - version - subject - algori
Baseline
Temporal Key Integrity Protocol (TKIP)
scope creep
Digital Certificate
28. A file system used by the Mac OS.
Decryption
Hierarchical File System (HFS)
Contingency Plan
Authentication Header (AH)
29. IP Protocol Scan
replay attack
Time Bomb
-sO
Sign in Seal
30. A measurable - physical characteristic used to recognize the identity - or verify the claimed identity - of an applicant. Facial images - fingerprints - and handwriting samples are all examples of biometrics.
Lightweight Directory Access Protocol (LDAP)
Countermeasures
Ethernet
Biometrics
31. Manipulating a search string with additional specific operators to search for vulnerabilities or very specific information.
-sS
POP 3
Google hacking
Cache
32. Access by information systems (or users) communicating from outside the information system security perimeter.
Simple Object Access Protocol (SOAP)
sniffer
Open System Interconnection (OSI) Reference Model
remote access
33. In penetration testing - this is a method of testing the security of a system or subnet without any previous knowledge of the device or network. Designed to simulate an attack by an outside intruder (usually from the Internet).
pattern matching
Asymmetric Algorithm
Black Box Testing
patch
34. An API that provides services related to the OSI model's Session layer - allowing applications on separate computers to communicate over a LAN.
serialize scans & 15 sec wait
Transport Layer Security (TLS)
Network Basic Input/Output System (NetBIOS)
Syslog
35. A program designed to browse websites in an automated - methodical manner. Sometimes these programs are used to harvest information from websites - such as e-mail addresses.
Overwhelm CAM table to convert switch to hub mode
suicide hacker
Web Spider
Methodology
36. Part of a service contract where the level of service is formally defined; may be required as part of the initial pen test agreements.
promiscuous mode
service level agreements (SLAs)
Wireless Local Area Network (WLAN)
Cryptographic Key
37. Vulnerability Scanning
serialize scans & 15 sec wait
Zenmap
infrastructure mode
The automated process of proactively identifying vulnerabilities of computing systems present in a network
38. TCP Ping
Algorithm
Domain Name
pattern matching
-PT
39. A unit of information formatted according to specific protocols that allows precise transmittal of data from one network node to another. Also called a datagram or data packet - a packet contains a header (container) and a payload (contents). Any IP
parallel scan & 75 sec timeout & 0.3 sec/probe
Internet Protocol Security (IPSec) architecture
Confidentiality
packet
40. Wireless LAN standards created by IEEE. 802.11a runs at up to 54Mbps at 5GHz - 802.11b runs at 11Mbps at 2.4GHz - 802.11g runs at 54Mbps at 2.4GHz - and 802.11n can run upwards of 150MBps.
-oN
Exposure Factor
Lightweight Directory Access Protocol (LDAP)
802.11
41. An early network application that provides information on users currently logged on to a machine.
Cloning
Finger
spoofing
Tiger Team
42. A software license agreement; a contract between the 'licensor' and purchaser establishing the right to use the software.
-sU
End User Licensing Agreement (EULA)
Information Technology Security Evaluation Criteria (ITSEC)
honeynet
43. The secret portion of an asymmetric key pair typically used to decrypt or digitally sign data. The private key is never shared and is always used for decryption - with one notable exception: The private key is used to encrypt the digital signature.
-PT
enumeration
Block Cipher
private key
44. Phases of an attack
gateway
Reconnaissance - Scanning - Gaining Access - Maintaining Access - Covering Tracks
spoofing
Wi-Fi Protected Access (WPA)
45. A symmetric - block-cipher data-encryption standard that uses a variablelength key that can range from 32 bits to 448 bits.
INFOSEC Assessment Methodology (IAM)
steganography
Wi-Fi
Blowfish
46. A method of permitting only MAC addresses in a preapproved list network access. Addresses not matching are blocked.
firewall
Client
MAC filtering
stateful packet filtering
47. The science or study of protecting information - whether in transit or at rest - by using techniques to render the information unusable to anyone who does not possess the means to decrypt it.
Countermeasures
Cryptography
Domain Name System (DNS) lookup
hacktivism
48. An organization composed of engineers - scientists - and students who issue standards related to electrical - electronic - and computer engineering.
Institute of Electrical and Electronics Engineers (IEEE)
Fraud and related activity in connection with computers
public key
null session
49. The rate at which a biometric system will incorrectly identify an unauthorized individual and allow them access (see false negative).
Algorithm
False Acceptance Rate (FAR)
encryption
HIDS
50. Describes practices in production and development that promote access to the end product's source materials.
ring topology
security defect
open source
patch
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests