SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. In computer security - this is an algorithm that uses separate keys for encryption and decryption.
-sA
Point-to-Point Tunneling Protocol (PPTP)
Asymmetric Algorithm
-PS
2. A network deployed as a trap to detect - deflect - or deter unauthorized use of information systems.
packet
Defense in Depth
port knocking
honeynet
3. TCP Ping
File Transfer Protocol (FTP)
nslookup
Point-to-Point Protocol (PPP)
-PT
4. The process of using an application to remotely identify open ports on a system (for example - whether systems allow connections through those ports).
Domain Name System (DNS) lookup
International Organization for Standardization (ISO)
port scanning
NetBus
5. The conveying of official access or legal power to a person or entity.
FreeBSD
-sA
Authorization
Domain Name System (DNS) cache poisoning
6. A command used in HTTP and FTP to retrieve a file from a server.
Hypertext Transfer Protocol (HTTP)
Institute of Electrical and Electronics Engineers (IEEE)
Audit Data
GET
7. Originally an extension of PPP - this is a protocol for authentication used within wireless networks. Works with multiple authentication measures.
honeypot
Countermeasures
sidejacking
Extensible Authentication Protocol (EAP)
8. Controlling access to a network by analyzing the headers of incoming and outgoing packets - and letting them pass or discarding them based on rule sets created by a network administrator. A packet filter allows or denies packets based on destination
packet filtering
gray box testing
parallel scan & 300 sec timeout & 1.25 sec/probe
End User Licensing Agreement (EULA)
9. A fully operational off-site data-processing facility equipped with hardware and system software to be used in the event of a disaster.
hot site
Written Authorization
inference attack
Time Bomb
10. Incremental Substitution
Replacing numbers in a url to access other files
intrusion detection system (IDS)
red team
File Allocation Table (FAT)
11. Safeguards or countermeasures to avoid - counteract - or minimize security risks.
John the Ripper - LOphtcrack - Ophtcrack - Cain and Abel
NetBSD
security controls
passive attack
12. NSA
Worm
-PB
shoulder surfing
National Security Agency
13. A means of exchanging information from one entity to another using a process that does not provide an attacker the opportunity to reorder - delete - insert - or read information.
secure channel
Serial Line Internet Protocol (SLIP)
Secure Multipurpose Mail Extension (S/MIME)
Trusted Computer System Evaluation Criteria (TCSEC)
14. A computer virus that infects and spreads in multiple ways.
Acknowledgment (ACK)
John the Ripper - LOphtcrack - Ophtcrack - Cain and Abel
Written Authorization
Multipartite virus
15. A nontechnical method of hacking. Social engineering is the art of manipulating people - whether in person (human-based) or via computing methods (computer-based) - into providing sensitive information.
Hacks without permission
social engineering
Asymmetric Algorithm
Digital Watermarking
16. Name given to expert groups that handle computer security incidents.
Information Technology Security Evaluation Criteria (ITSEC)
Exposure Factor
Packet Internet Groper (ping)
Computer Emergency Response Team (CERT)
17. nmap all output
-oA
-sF
integrity
Internet service provider (ISP)
18. Black box test
No previous knowledge of the network
Information Technology (IT) security architecture and framework
Electronic Code Book (ECB)
The automated process of proactively identifying vulnerabilities of computing systems present in a network
19. A malicious computer program with self-replication capabilities that attaches to another file and moves with the host from one computer to another.
separation of duties
Virus
packet
Fiber Distributed Data Interface (FDDI)
20. A term trademarked by the Wi-Fi Alliance - used to define a standard for devices to use to connect to a wireless network.
net use \[target ip]IPC$ '' /user:''
Access Point (AP)
sidejacking
Wi-Fi
21. A wireless LAN device that acts as a central point for all wireless traffic. The AP is connected to both the wireless LAN and the wired LAN - providing wireless clients access to network resources.
sidejacking
port knocking
Access Point (AP)
honeypot
22. A computer system that performs tasks dictated by an attacker from a remote location. Zombies may be active or idle - and owners of the systems generally do not know their systems are compromised.
Electronic serial number
impersonation
Zombie
self encrypting
23. A method in cryptography by which cryptographic keys are exchanged between users - allowing use of a cryptographic algorithm (for example - the Diffie-Hellman key exchange).
spyware
INFOSEC Assessment Methodology (IAM)
-PP
key exchange protocol
24. A term representing the responsibility managers and their organizations have to provide information security to ensure the type of control - the cost of control - and the deployment of control are appropriate for the system being managed.
Due Care
R
Active Directory (AD)
S
25. The potential for damage to or loss of an IT asset
Demilitarized Zone (DMZ)
POP 3
risk
Crossover Error Rate (CER)
26. A biometric device that uses pattern-recognition techniques based on images of the irises of an individual's eyes.
self encrypting
iris scanner
Contingency Plan
Internet Protocol (IP)
27. Formal description and evaluation of the vulnerabilities in an information system
Videocipher II Satellite Encryption System
heuristic scanning
POST
Vulnerability Assessment
28. An evaluation consisting of a document review - interviews - and demonstrations. No hands-on testing is performed.
source routing
SNMP
Level I assessment
S
29. Controls to detect anomalies or undesirable events occurring on a system.
Detective Controls
-oA
non-repudiation
fragmentation
30. A method for detecting malicious code on a computer where the files are compared to signatures of known viruses stored in a database.
signature scanning
public key infrastructure (PKI)
router
route
31. A brand name of analog scrambling and de-scrambling equipment for cable and satellite television - invented primarily to keep consumer Television receive-only (TVRO) satellite equipment from receiving TV programming except on a subscription basis.
-sR
A R
Videocipher II Satellite Encryption System
Multipartite virus
32. A security tool designed to protect a system or network against attacks by comparing traffic patterns against a list of both known attack signatures and general characteristics of how attacks may be carried out. Threats are rated and reported.
Access Control List (ACL)
intrusion detection system (IDS)
-PS
Service Set Identifier (SSID)
33. The rate at which a biometric system will incorrectly identify an unauthorized individual and allow them access (see false negative).
site survey
False Acceptance Rate (FAR)
NetBus
qualitative analysis
34. Ports 20/21
Local Administrator
enumeration
FTP
Access Control List (ACL)
35. A type of DNS transfer - where all records from an SOA are transmitted to the requestor. Zone transfers have two options: full (opcode AXFR) and incremental (IXFR).
Zone transfer
SOA record
route
Pretty Good Privacy (PGP)
36. A background process found in Unix - Linux - Solaris - and other Unix-based operating systems.
Corrective Controls
symmetric encryption
Daemon
Finger
37. A technology that establishes a tunnel to create a private - dedicated - leased-line network over the Internet. The data is encrypted so it's readable only by the sender and receiver. Companies commonly use VPNs to allow employees to connect securely
reverse social engineering
Confidentiality
Institute of Electrical and Electronics Engineers (IEEE)
Virtual Private Network (VPN)
38. A symmetric key cipher where plaintext bits are combined with a pseudo-random cipher bit stream (keystream) - typically by an exclusive-or (XOR) operation. In a stream cipher the plaintext digits are encrypted one at a time - and the transformation o
Defense in Depth
802.11
stream cipher
nslookup
39. A suite of protocols used for securing Internet Protocol (IP) communications by authenticating and encrypting each IP packet of a communication session. This suite includes protocols for establishing mutual authentication between agents at the sessio
Interior Gateway Protocol (IGP)
Internet Protocol Security (IPSec) architecture
False Acceptance Rate (FAR)
Uniform Resource Locator (URL)
40. The process of determining if a network entity (user or service) is legitimate
Challenge Handshake Authentication Protocol (CHAP)
pattern matching
Authentication
Backdoor
41. The directory service created by Microsoft for use on itsnetworks. Provides a variety of network services using Lightweight Directory Access Protocol (LDAP) - Kerberos-based authentication - and single sign-on for user access to network-based resourc
Active Directory (AD)
Threat
iris scanner
Institute of Electrical and Electronics Engineers (IEEE)
42. A set of exclusive rights granted by the law of a jurisdiction to the author or creator of an original work - including the right to copy - distribute - and adapt the work.
TACACS
Due Care
Copyright
Multipurpose Internet Mail Extensions (MIME)
43. White box test
quality of service (QoS)
false negative
parameter tampering
Internal access to the network
44. Whether purposeful or the result of malware or other attack - a backdoor is a hidden capability in a system or program for bypassing normal computer authentication systems.
Kerberos
Backdoor
hardware keystroke logger
Banner Grabbing
45. Start of Authority record. This record identifies the primary name server for the zone. The SOA record contains the host name of the server responsible for all DNS records within the namespace - as well as the basic properties of the domain.
Cold Site
sheepdip
SOA record
intrusion prevention system (IPS)
46. A network system of servers that translates numeric Internet Protocol (IP) addresses into human-friendly - hierarchical Internet addresses - and vice versa.
ISO 17799
Domain Name System (DNS)
Information Technology Security Evaluation Criteria (ITSEC)
Domain Name System (DNS) lookup
47. SYN Ping
NT LAN Manager (NTLM)
A series of messages sent by someone attempting to break into a computer to learn about the computer's network services.
port knocking
-PS
48. Part of a service contract where the level of service is formally defined; may be required as part of the initial pen test agreements.
Digital Certificate
Domain Name
service level agreements (SLAs)
Algorithm
49. A query and response protocol widely used for querying databases that store the registered users or assignees of an Internet resource - such as a domain name - an IP address - or an autonomous system.
Vulnerability Assessment
Black Box Testing
Whois
File Allocation Table (FAT)
50. Sending unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobile phones - PDAs - or laptop computers.
Bluejacking
Time exceeded
risk transference
Hierarchical File System (HFS)