SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A small space having two sets of interlocking doors; the first set of doors must close before the second set opens. Typically authentication is required for each door - often using different factors. For example - a smart card may open the first door
FreeBSD
Mantrap
network tap
Virtual Private Network (VPN)
2. A suite of protocols used for securing Internet Protocol (IP) communications by authenticating and encrypting each IP packet of a communication session. This suite includes protocols for establishing mutual authentication between agents at the sessio
Internet Protocol Security (IPSec) architecture
open source
Anonymizer
International Organization for Standardization (ISO)
3. Also known as a digital certificate - this is an electronic file used to verify a user's identity - providing non-repudiation throughout the system It is also a set of data that uniquely identifies an entity. Certificates contain the entity's public
Certificate
-sU
penetration testing
Multipurpose Internet Mail Extensions (MIME)
4. ICMP Ping
-PT
security by obscurity
Blowfish
-PI
5. A method of permitting only MAC addresses in a preapproved list network access. Addresses not matching are blocked.
FTP
U P F
Lightweight Directory Access Protocol (LDAP)
MAC filtering
6. The Security Accounts Manager file in Windows stores all the password hashes for the system.
Hacks with permission
Secure Multipurpose Mail Extension (S/MIME)
Written Authorization
SAM
7. ICMP Netmask
-PM
Uniform Resource Locator (URL)
Trapdoor Function
Virtual Local Area Network (VLAN)
8. Safeguards or countermeasures to avoid - counteract - or minimize security risks.
-p <port ranges>
Anonymizer
pattern matching
security controls
9. nmap all output
-oN
Corrective Controls
Wi-Fi
-oA
10. A symmetric key cryptographic algorithm that transforms a block of information at a time using a cryptographic key. For a block cipher algorithm - the length of the input block is the same as the length of the output block.
Block Cipher
ping sweep
pattern matching
Videocipher II Satellite Encryption System
11. A one-way mathematical function that generates a fixedlength numerical string (hash) from a given data input. MD5 and SHA-1 are hashing algorithms.
hashing algorithm
Temporal Key Integrity Protocol (TKIP)
Telnet
MAC filtering
12. A TCP flag notifying an originating station that the preceding packet (or packets) has been received.
Defines legal email marketing
Acknowledgment (ACK)
Kerberos
Authentication
13. An attack against an authentication protocol in which the attacker intercepts data in transit along the network between the claimant and verifier - but does not alter the data (in other words - eavesdropping).
segment
Domain Name System (DNS) lookup
passive attack
Echo Reply
14. Confidentiality - Integrity - and Availability are the three aspects of security and make up the triangle.
Access Control List (ACL)
Videocipher II Satellite Encryption System
Network Address Translation (NAT)
CIA triangle
15. A security tool designed to protect a system or network against attacks by comparing traffic patterns against a list of both known attack signatures and general characteristics of how attacks may be carried out. Threats are rated and protective measu
Computer Emergency Response Team (CERT)
Common Internet File System/Server Message Block
Countermeasures
intrusion prevention system (IPS)
16. Port 135
Local Administrator
Daisy Chaining
gray hat
RPC-DCOM
17. A social-engineering attack that manipulates the victim into calling the attacker for help.
Cryptographic Key
Discretionary Access Control (DAC)
reverse social engineering
-sP
18. Layer 6 of the OSI reference model. The Presentation layer ensures information sent by the Application layer of the sending system will be readable by the Application layer of the receiving system.
Vulnerability Assessment
Tunneling
Presentation layer
secure channel
19. An attack with the goal of preventing authorized users from accessing services and preventing the normal operation of computers and networks.
Audit Trail
Eavesdropping
firewall
Denial of Service (DoS)
20. A type of encryption where the same key is used to encrypt and decrypt the message.
Domain Name
symmetric encryption
Last In First Out (LIFO)
Written Authorization
21. Recording the time - normally in a log file - when an event happens or when information is created or modified.
XOR Operation
Timestamping
Confidentiality
-sO
22. Terminal Access Controller Access-Control System. A remote authentication protocol that is used to communicate with an authentication server commonly used in Unix networks.
key exchange protocol
TACACS
Client
ISO 17799
23. Unauthorized access to information such as a calendar - contact list - e-mails - and text messages on a wireless device through a Bluetooth connection.
POP 3
Temporal Key Integrity Protocol (TKIP)
Telnet
Bluesnarfing
24. The ability to trace actions performed on a system to a specific user or system entity.
Accountability
firewalking
gray hat
Baseline
25. The process of systematically testing each port on a firewall to map rules and determine accessible ports.
firewalking
Information Technology (IT) infrastructure
footprinting
Domain Name System (DNS)
26. In computer security - this is an algorithm that uses separate keys for encryption and decryption.
Asymmetric Algorithm
Biometrics
File Transfer Protocol (FTP)
Google hacking
27. A background process found in Unix - Linux - Solaris - and other Unix-based operating systems.
Post Office Protocol 3 (POP3)
Daemon
A R
shoulder surfing
28. A measurable - physical characteristic used to recognize the identity - or verify the claimed identity - of an applicant. Facial images - fingerprints - and handwriting samples are all examples of biometrics.
Biometrics
Master boot record infector
Internet Assigned Number Authority (IANA)
SOA record
29. Port 31337
reconnaissance
parallel scan & 300 sec timeout & 1.25 sec/probe
Back orifice
Challenge Handshake Authentication Protocol (CHAP)
30. 18 U.S.C. 1029
Address Resolution Protocol (ARP) table
Overwhelm CAM table to convert switch to hub mode
Possession of access devices
-sX
31. Policy stating what users of a system can and cannot do with the organization's assets.
symmetric algorithm
Acceptable Use Policy (AUP)
Wi-Fi
self encrypting
32. An outdated symmetric cipher encryption algorithm - previously U.S. government-approved and used by business and civilian government agencies. DES is no longer considered secure due to the ease with which the entire keyspace can be attempted using mo
sheepdip
Time Bomb
infrastructure mode
Data Encryption Standard (DES)
33. A string used for authentication in SNMP. The public community string is used for read-only searches - whereas the private community string is used for read/write. Community strings are transmitted in clear text in SNMPv1. SNMPv3 provides encryption
polymorphic virus
Community String
Echo Reply
Ethical Hacker
34. Sending unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobile phones - PDAs - or laptop computers.
Bluejacking
impersonation
Traceroute
Application Layer
35. Establish Null Session
File Allocation Table (FAT)
payload
Syslog
net use \[target ip]IPC$ '' /user:''
36. A proprietary - open - wireless technology used for transferring data from fixed and mobile devices over short distances.
Bluetooth
sheepdip
Secure Multipurpose Mail Extension (S/MIME)
Collision
37. Port 23
Kerberos
Telnet
non-repudiation
Eavesdropping
38. Steps taken to identify and limit risks to an acceptable or reasonable level of exposure.
-PI
GET
Simple Network Management Protocol (SNMP)
Due Diligence
39. A text file stored within a browser by a web server that maintains information about the connection. Cookies are used to store information to maintain a unique but consistent surfing experience - but can also contain authentication parameters. Cookie
Cookie
International Organization for Standardization (ISO)
Lightweight Directory Access Protocol (LDAP)
security controls
40. A set of rules defined to screen network packets based on source address - destination address - or protocol; these rules determine whether the packet will be forwarded or discarded.
Filter
ECHO reply
encapsulation
firewalking
41. The concept of having more than one person required to complete a task
File Transfer Protocol (FTP)
Methodology
Console Port
separation of duties
42. Activities to determine the extent to which a security control is implemented correctly - operating as intended - and producing the desired outcome with respect to meeting the security requirements for the system.
fully qualified domain name (FQDN)
qualitative analysis
Assessment
open source
43. A wireless LAN device that acts as a central point for all wireless traffic. The AP is connected to both the wireless LAN and the wired LAN - providing wireless clients access to network resources.
Archive
security by obscurity
Access Point (AP)
false negative
44. Incremental Substitution
firewall
Wi-Fi
Media Access Control (MAC)
Replacing numbers in a url to access other files
45. Any network incident that prompts some kind of log entry or other notification.
Interior Gateway Protocol (IGP)
-sT
Telnet
Event
46. Wireless LAN standards created by IEEE. 802.11a runs at up to 54Mbps at 5GHz - 802.11b runs at 11Mbps at 2.4GHz - 802.11g runs at 54Mbps at 2.4GHz - and 802.11n can run upwards of 150MBps.
802.11
false rejection rate (FRR)
Internet Assigned Number Authority (IANA)
Tiger Team
47. A software or hardware defect that often results in system vulnerabilities.
Data Link layer
gray box testing
Bug
Console Port
48. A standard that provides best-practice recommendations on information security management for use by those responsible for initiating - implementing - or maintaining Information Security Management Systems (ISMS). Information security is defined with
hardware keystroke logger
-sA
ISO 17799
Multipartite virus
49. Created by the U.S. Federal Communications Commission to uniquely identify mobile devices; often represented as an 11-digit decimal number or eight-digit hexadecimal number.
separation of duties
Electronic serial number
ISO 17799
File Allocation Table (FAT)
50. A social-engineering effort in which the attacker pretends to be an employee - a valid user - or even an executive to elicit information or access.
Kerberos
impersonation
Countermeasures
Kerberos