SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Cracking Tools
Wired Equivalent Privacy (WEP)
Certificate Authority (CA)
limitation of liability and remedies
John the Ripper - LOphtcrack - Ophtcrack - Cain and Abel
2. A free - open source version of the Berkeley Software Distribution of Unix - often used in embedded systems.
NetBSD
Active Attack
ISO 17799
Vulnerability Scanning
3. Shifting responsibility from one party to another
risk transference
Cloning
spyware
security breach or security incident
4. A comparison metric for different biometric devices and technologies; the point at which the false acceptance rate (FAR) equals the
Data Link layer
CNAME record
Crossover Error Rate (CER)
Block Cipher
5. An attack where the hacker positions himself between the client and the server - to intercept (and sometimes alter) data traveling between the two.
FTP
security defect
Man-in-the-middle attack
Secure Multipurpose Mail Extension (S/MIME)
6. The process of pinging each address within a subnet to map potential targets. Ping sweeps are unreliable and easily detectable - but very fast.
ping sweep
logic bomb
War Dialing
-sT
7. Controlling access to a network by analyzing the headers of incoming and outgoing packets - and letting them pass or discarding them based on rule sets created by a network administrator. A packet filter allows or denies packets based on destination
Cryptography
Information Technology (IT) asset valuation
packet filtering
Post Office Protocol 3 (POP3)
8. Transmitting one protocol encapsulated inside another protocol.
Competitive Intelligence
Tunneling
POP 3
node
9. A wireless networking mode where all clients connect to the wireless network through a central access point.
Tunneling
infrastructure mode
Due Care
Zombie
10. SYN Ping
personal identification number (PIN)
File Transfer Protocol (FTP)
Third Party
-PS
11. Port 389
LDAP
Methodology
Ciphertext
hardware keystroke logger
12. 1. The path a packet travels to reach the intended destination. Each individual device along the path traveled is called a hop. 2. Information contained on a device containing instructions for reaching other nodes on the network. This information can
Authentication - Authorization - and Accounting (AAA)
route
EDGAR database
Audit Trail
13. An announcement - typically from a software vendor - of a known security vulnerability in a program; often the bulletin contains instructions for the application of a software patch.
segment
User Datagram Protocol (UDP)
security bulletins
Copyright
14. A type of encryption where the same key is used to encrypt and decrypt the message.
XOR Operation
symmetric encryption
Information Technology Security Evaluation Criteria (ITSEC)
symmetric algorithm
15. The act of secretly listening to the private conversations of others without their consent. This can also be done over telephone lines (wiretapping) - e-mail - instant messaging - and other methods of communication considered private
Zone transfer
Vulnerability Assessment
public key infrastructure (PKI)
Eavesdropping
16. A group of penetration testers that assess the security of an organization - which is often unaware of the existence of the team or the exact assignment.
script kiddie
Baseline
User Datagram Protocol (UDP)
red team
17. A device or service designed to obfuscate traffic between a client and the Internet. Generally used to make activity on the Internet as untraceable as possible.
Eavesdropping
Routing Information Protocol (RIP)
Console Port
Anonymizer
18. An enumeration technique used to provide information about a computer system; generally used for operating system identification (also known as fingerprinting).
parameter tampering
Buffer
Banner Grabbing
Digital Certificate
19. A list of IP addresses and corresponding MAC addresses stored on a local computer.
Post Office Protocol 3 (POP3)
Fiber Distributed Data Interface (FDDI)
Database
Address Resolution Protocol (ARP) table
20. Version Detection Scan
network access server
Possession of access devices
-sV
Antivirus (AV) software
21. An industry standard protocol used for accessing and managing information within a directory service; an application protocol for querying and modifying data using directory services running over TCP/IP.
Address Resolution Protocol (ARP)
Lightweight Directory Access Protocol (LDAP)
Institute of Electrical and Electronics Engineers (IEEE)
stream cipher
22. A unit of information formatted according to specific protocols that allows precise transmittal of data from one network node to another. Also called a datagram or data packet - a packet contains a header (container) and a payload (contents). Any IP
Access Control List (ACL)
R
packet
Auditing
23. Occurs when authorized users accumulate excess privileges on a system due to moving from position to position.
Access Creep
Countermeasures
John the Ripper - LOphtcrack - Ophtcrack - Cain and Abel
public key infrastructure (PKI)
24. Monitoring of telephone or Internet conversations - typically by covert means.
Hacks without permission
secure channel
Wiretapping
quantitative risk assessment
25. A portion of memory used to temporarily store output or input data.
-oN
Wi-Fi
Buffer
Media Access Control (MAC)
26. An attack technique that tricks your DNS server into believing it has received authentic information when - in reality - it has been provided fraudulent data. DNS cache poisoning affects user traffic by sending it to erroneous or malicious end points
Domain Name System (DNS) cache poisoning
security breach or security incident
No previous knowledge of the network
Rijndael
27. When an authorized person allows (intentionally or unintentionally) someone to pass through a secure door - despite the fact that the intruder does not have a badge.
Authentication - Authorization - and Accounting (AAA)
Antivirus (AV) software
-PP
piggybacking
28. Content Addressable Memory table. Holds all the MAC-address-to-port mappings on a switch.
SID
CAM table
proxy server
ISO 17799
29. A set of exclusive rights granted by the law of a jurisdiction to the author or creator of an original work - including the right to copy - distribute - and adapt the work.
Copyright
Kerberos
Internet Assigned Number Authority (IANA)
shoulder surfing
30. An API that provides services related to the OSI model's Session layer - allowing applications on separate computers to communicate over a LAN.
Written Authorization
security incident response team (SIRT)
Routing Protocol
Network Basic Input/Output System (NetBIOS)
31. A pen testing method where the attacker knows all information about the internal network. It is designed to simulate an attack by a disgruntled systems administrator - or similar level.
-sU
personal identification number (PIN)
Copyright
White Box Testing
32. An organization's threshold for the seven areas of information security responsibility. This level is established based on the objectives for maintaining confidentiality - integrity - and availability of the organization's IT assets and infrastructur
Minimum acceptable level of risk
Zenmap
Macro virus
Community String
33. An evaluation conducted to determine the potential for damage to or loss of an IT asset.
Database
risk assessment
honeypot
packet filtering
34. A type of DNS transfer - where all records from an SOA are transmitted to the requestor. Zone transfers have two options: full (opcode AXFR) and incremental (IXFR).
Zone transfer
Daemon
Service Set Identifier (SSID)
Domain Name System (DNS) cache poisoning
35. A point-to-point connection between two endpoints created to exchangedata. Typically a tunnel is either an encrypted connection - or a connection using a protocol in a method for which it was not designed. An encrypted connection forms a point-to-poi
Tunnel
symmetric algorithm
SYN flood attack
NT LAN Manager (NTLM)
36. 18 U.S.C. 1029
Possession of access devices
DNS
Dumpster Diving
Redundant Array of Independent Disks (RAID)
37. A method of password cracking whereby all possible options are systematically enumerated until a match is found. These attacks try every password (or authentication option) - one after another - until successful. Bruteforce attacks take a long time t
MD5
Media Access Control (MAC)
reconnaissance
Brute-Force Password Attack
38. The level of importance assigned to an IT asset
quality of service (QoS)
public key infrastructure (PKI)
Information Technology (IT) asset criticality
payload
39. Baseband LAN specification developed by Xerox Corporation - Intel - and Digital Equipment Corporation. One of the least expensive - most widely deployed networking standards; uses the CSMA/CD method of media access control.
Decryption
CNAME record
Ethernet
Multipurpose Internet Mail Extensions (MIME)
40. Self-contained network with a limited number of participants who extend limited trust to one another in order to accomplish an agreed-upon goal.
Minimum acceptable level of risk
Corrective Controls
public key
intranet
41. A hybrid of the HTTP and SSL/TLS protocols that provides encrypted communication and secure identification of a web server.
security incident response team (SIRT)
Hypertext Transfer Protocol Secure (HTTPS)
Tumbling
Lightweight Directory Access Protocol (LDAP)
42. A method for detecting malicious code on a computer where the files are compared to signatures of known viruses stored in a database.
signature scanning
Minimum acceptable level of risk
Secure Sockets Layer (SSL)
Community String
43. White hat
ECHO reply
Hacks with permission
Antivirus (AV) software
Level III assessment
44. The cyclical practice of identifying - classifying - remediating - and mitigating vulnerabilities.
Baseline
Vulnerability Management
Port Address Translation (PAT)
Routing Information Protocol (RIP)
45. A symmetric - block-cipher data-encryption standard that uses a variablelength key that can range from 32 bits to 448 bits.
Kerberos
Authorization
Blowfish
promiscuous mode
46. A symmetric key cipher where plaintext bits are combined with a pseudo-random cipher bit stream (keystream) - typically by an exclusive-or (XOR) operation. In a stream cipher the plaintext digits are encrypted one at a time - and the transformation o
-oG
stream cipher
SSH
Active Attack
47. The change or growth of a project's scope
parallel scan & 75 sec timeout & 0.3 sec/probe
scope creep
Hypertext Transfer Protocol Secure (HTTPS)
Wide Area Network (WAN)
48. An outdated symmetric cipher encryption algorithm - previously U.S. government-approved and used by business and civilian government agencies. DES is no longer considered secure due to the ease with which the entire keyspace can be attempted using mo
Data Encryption Standard (DES)
reverse lookup; reverse DNS lookup
security controls
Baseline
49. A protocol that allows a client computer to request services from a server and the server to return the results.
quantitative risk assessment
parallel scan & 300 sec timeout & 1.25 sec/probe
operating system attack
remote procedure call (RPC)
50. A social-engineering effort in which the attacker pretends to be an employee - a valid user - or even an executive to elicit information or access.
gap analysis
Trapdoor Function
Information Technology (IT) infrastructure
impersonation