SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A measurable - physical characteristic used to recognize the identity - or verify the claimed identity - of an applicant. Facial images - fingerprints - and handwriting samples are all examples of biometrics.
rule-based access control
Biometrics
Crossover Error Rate (CER)
service level agreements (SLAs)
2. A method of network traffic filtering that monitors the entire communications process - including the originator of the session and from which direction it started.
Level I assessment
stateful packet filtering
fully qualified domain name (FQDN)
Asymmetric Algorithm
3. A programming principle whereby the last piece of data added to the stack is the first piece of data taken off.
Mantrap
Last In First Out (LIFO)
Zone transfer
OpenBSD
4. Occurs when authorized users accumulate excess privileges on a system due to moving from position to position.
Access Creep
social engineering
Multipartite virus
Hypertext Transfer Protocol (HTTP)
5. A point-to-point connection between two endpoints created to exchangedata. Typically a tunnel is either an encrypted connection - or a connection using a protocol in a method for which it was not designed. An encrypted connection forms a point-to-poi
Tunnel
rule-based access control
A procedure for identifying active hosts on a network.
Droppers
6. Text or data in its encrypted form; the result of plaintext being input into a cryptographic algorithm.
Boot Sector Virus
Ciphertext
smart card
Domain Name System (DNS) cache poisoning
7. PI and PT Ping
Brute-Force Password Attack
Tunneling
-PM
-PB
8. A communications path - such as the Internet - authorized for data transmission within a computer system or network.
Daisy Chaining
-sL
Demilitarized Zone (DMZ)
overt channel
9. ICMP Ping
HTTP
promiscuous mode
Active Fingerprinting
-PI
10. A Windows-based GUI version of nmap.
Biometrics
POST
-PS
Zenmap
11. A section or subset of the network. Often a router or other routing device provides the end point of the segment.
segment
Internal access to the network
-oX
encryption
12. Injecting traffic into the network to identify the operating system of a device.
Active Fingerprinting
-b
red team
service level agreements (SLAs)
13. An attack where the hacker manipulates parameters within the URL string in hopes of modifying data.
Internet Protocol Security (IPSec) architecture
parameter tampering
service level agreements (SLAs)
Daemon
14. Unauthorized access to information such as a calendar - contact list - e-mails - and text messages on a wireless device through a Bluetooth connection.
Bluesnarfing
Level III assessment
spyware
Crossover Error Rate (CER)
15. The act of dialing all numbers within an organization to discover open modems.
node
War Dialing
Internet Control Message Protocol (ICMP)
gray box testing
16. A device that provides access between two or more networks. Gateways are typically used to connect dissimilar networks.
Due Care
shoulder surfing
ECHO reply
gateway
17. Two or more LANs connected by a high-speed line across a large geographical area.
Password Authentication Protocol (PAP)
Pretty Good Privacy (PGP)
Internet Control Message Protocol (ICMP)
Wide Area Network (WAN)
18. Vulnerability Scanning
Wi-Fi Protected Access (WPA)
The automated process of proactively identifying vulnerabilities of computing systems present in a network
RxBoot
Unicode
19. A group of penetration testers that assess the security of an organization - which is often unaware of the existence of the team or the exact assignment.
red team
queue
separation of duties
network tap
20. A set of rules defined to screen network packets based on source address - destination address - or protocol; these rules determine whether the packet will be forwarded or discarded.
key exchange protocol
gateway
rule-based access control
Filter
21. Evaluation in which testers attempt to penetrate the network.
null session
Level III assessment
shoulder surfing
Asset
22. The process of a system providing a fully qualified domain name (FQDN) to a local name server - for resolution to its corresponding IP address.
reverse social engineering
routed protocol
Tunneling Virus
Domain Name System (DNS) lookup
23. A situation in which an IDS or other sensor triggers on an event as an intrusion attempt - when it was actually legitimate traffic.
false negative
replay attack
Console Port
Level I assessment
24. A form of fraud in which someone pretends to be someone else by assuming that person's identity - typically in order to access resources or obtain credit and other benefits in that person's name.
U P F
Domain Name System (DNS)
identity theft
Access Creep
25. An application that monitors a computer or network to identify - and prevent - malware. AV is usually signature-based - and can take multiple actions on defined malware files/activity.
XOR Operation
Internet Protocol Security (IPSec) architecture
End User Licensing Agreement (EULA)
Antivirus (AV) software
26. Ports 20/21
Videocipher II Satellite Encryption System
-oG
Zenmap
FTP
27. The monetary value expected from the occurrence of a risk on an asset. It is mathematically expressed as single loss expectancy (SLE) = asset value (AV)
Brute-Force Password Attack
-PP
single loss expectancy (SLE)
Data Link layer
28. Hex 10
stream cipher
A
HTTP
Post Office Protocol 3 (POP3)
29. The cyclical practice of identifying - classifying - remediating - and mitigating vulnerabilities.
S
-sL
Vulnerability Management
-PB
30. A limit on the amount of time or number of iterations or transmissions in computer and network technology a packet can experience before it will be discarded.
Time To Live (TTL)
role-based access control
MAC filtering
impersonation
31. Management policy and procedures designed to maintain or restore business operations - including computer operations - possibly at an alternate location - in the event of emergencies - system failures - or disaster.
Tiger Team
Decryption
hashing algorithm
Contingency Plan
32. A communications channel that is being used for a purpose it was not intended for - usually to transfer information secretly.
-oA
Covert Channel
Buffer Overflow
Confidentiality
33. The means by which a recipient of a message can ensure the identity of the sender and that neither party can deny having sent or received the message. The most common method is through digital certificates.
Presentation layer
enumeration
MAC filtering
non-repudiation
34. The set of all hardware - firmware - and/or software components critical to IT security. Bugs or vulnerabilities occurring inside the TCB might jeopardize the security properties of the entire system.
Trusted Computer Base (TCB)
Routing Protocol
serial scan & 300 sec wait
Defines legal email marketing
35. A portion of memory used to temporarily store output or input data.
Buffer
Malicious code
Secure Multipurpose Mail Extension (S/MIME)
-PI
36. A principle in security engineering that attempts to use anonymity and secrecy (of design - implementation - and so on) to provide security; the footprint of the organization - entity - network - or system is kept as small as possible to avoid intere
Access Point (AP)
security by obscurity
social engineering
Domain Name System (DNS) lookup
37. Polymorphic Virus
self encrypting
serialize scans & 15 sec wait
Target Of Engagement (TOE)
Echo request
38. 18 U.S.C. 1030
Biometrics
Fraud and related activity in connection with computers
quantitative risk assessment
Corrective Controls
39. The process of sending a packet or frame toward the destination. In a switch - messages are forwarded only to the port they are addressed to.
Exposure Factor
forwarding
Backdoor
Information Technology (IT) security architecture and framework
40. Security measures - such as a locked door - perimeter fence - or security guard - to prevent or deter physical access to a facility - resource - or information stored on physical media.
physical security
Reconnaissance - Scanning - Gaining Access - Maintaining Access - Covering Tracks
scope creep
404EE
41. nmap all output
impersonation
-oA
Black Box Testing
Event
42. An announcement - typically from a software vendor - of a known security vulnerability in a program; often the bulletin contains instructions for the application of a software patch.
encapsulation
Domain Name
security bulletins
Authentication
43. Software or firmware intended to perform an unauthorized process that will have an adverse impact on the confidentiality - integrity - or availability of an information system. A virus - worm - Trojan horse - or other code-based entity that infects a
Wi-Fi
Information Technology (IT) asset valuation
serial scan & 300 sec wait
Malicious code
44. The process of using easily accessible DNS records to map a target network's internal hosts.
Digital Signature
-b
Traceroute
DNS enumeration
45. As an identification device becomes more sensitive or accurate - its FAR decreases while its FRR increases. The CER is the point at which these two rates are equal - or cross over.
false rejection rate (FRR)
Echo request
separation of duties
spoofing
46. A stand-alone computer - kept off the network - that is used for scanning potentially malicious media or software.
NT LAN Manager (NTLM)
Trojan Horse
sheepdip
single loss expectancy (SLE)
47. A protocol used to pass control and error messages between nodes on the Internet.
Console Port
Detective Controls
Internet Control Message Protocol (ICMP)
Internet Protocol (IP)
48. Safeguards or countermeasures to avoid - counteract - or minimize security risks.
security controls
site survey
personal identification number (PIN)
Collision
49. A denial-of-service technique that uses numerous hosts to perform the attack.
Zenmap
CAM table
Open System Interconnection (OSI) Reference Model
Distributed DoS (DDoS)
50. A string that represents the location of a web resource
Third Party
SMB
Uniform Resource Locator (URL)
Certificate