SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. An Internet routing protocol used to exchange routing information within an autonomous system.
Threat
Interior Gateway Protocol (IGP)
Packet Internet Groper (ping)
Denial of Service (DoS)
2. A device providing temporary - on-demand - point-to-point network access to users.
Certificate
Trusted Computer Base (TCB)
network access server
Access Point (AP)
3. White box test
Brute-Force Password Attack
Vulnerability Management
XOR Operation
Internal access to the network
4. A group of people - gathered together by a business entity - working to address a specific problem or goal.
Simple Object Access Protocol (SOAP)
Timestamping
Tiger Team
Transport Layer Security (TLS)
5. A mode of operation in a wireless LAN in which clients send data directly to one another without utilizing a wireless access point (WAP) - much like a point-to-point wired connection.
ad hoc mode
-PS
router
FreeBSD
6. A system used by the Securities and Exchange Commission (SEC) for companies and businesses to transmit required filings and information. The EDGAR database performs automated collection - validation - indexing - acceptance - and forwarding of submiss
qualitative analysis
false rejection rate (FRR)
Ciphertext
EDGAR database
7. A program or piece of code inserted into a system - usually covertly - with the intent of compromising the confidentiality - integrity - or availability of the victim's data - applications - or operating system. Malware consists of viruses - worms -
SYN attack
quality of service (QoS)
Malware
identity theft
8. An Application layer protocol used by local email clients to retrieve e-mail from a remote server over a TCP/IP connection.
Time To Live (TTL)
Post Office Protocol 3 (POP3)
War Dialing
routed protocol
9. A protocol defining packets that are able to be routed by a router.
routed protocol
Certificate Authority (CA)
Secure Sockets Layer (SSL)
Wiretapping
10. Safeguards or countermeasures to avoid - counteract - or minimize security risks.
Information Technology (IT) infrastructure
RxBoot
Common Internet File System/Server Message Block
security controls
11. Nmap normal output
-oN
Google hacking
patch
Backdoor
12. A method of defining what rights and permissions an entity has to a given resource. In networking - Access Control Lists are commonly associated with firewall and router traffic filtering rules.
National Security Agency
Echo request
Access Control List (ACL)
404EE
13. A sublayer of layer 2 of the OSI model - the Data Link layer. It provides addressing and channel access control mechanisms that enable several terminals or network nodes to communicate within a multipoint network.
Media Access Control (MAC)
-sS
shrink-wrap code attacks
sniffer
14. A security tool designed to protect a system or network against attacks by comparing traffic patterns against a list of both known attack signatures and general characteristics of how attacks may be carried out. Threats are rated and reported.
intrusion detection system (IDS)
Information Technology (IT) security architecture and framework
quantitative risk assessment
-P0
15. Cracking Tools
Domain Name
qualitative analysis
John the Ripper - LOphtcrack - Ophtcrack - Cain and Abel
Audit Data
16. An information assurance strategy in which multiple layers of defense are placed throughout an Information Technology system.
Biometrics
open source
Defense in Depth
Due Diligence
17. A pen testing method where the attacker knows all information about the internal network. It is designed to simulate an attack by a disgruntled systems administrator - or similar level.
Community String
White Box Testing
quality of service (QoS)
initial sequence number (ISN)
18. Phases of an attack
Baseline
White Box Testing
Reconnaissance - Scanning - Gaining Access - Maintaining Access - Covering Tracks
Tunnel
19. TCP SYN Scan
Tini
footprinting
-sS
Media Access Control (MAC)
20. A protocol used to pass control and error messages between nodes on the Internet.
network access server
DNS
Internet Control Message Protocol (ICMP)
Computer Emergency Response Team (CERT)
21. IP Protocol Scan
Domain Name System (DNS)
-sO
Computer-Based Attack
Syslog
22. A widely used authentication protocol developed at the MassachusettsInstitute of Technology (MIT). Kerberos authentication uses tickets - Ticket Granting Service - and Key Distribution Center.
Kerberos
session hijacking
Common Internet File System/Server Message Block
sidejacking
23. A non-self-replicating program that appears to have a useful purpose - but in reality has a different - malicious purpose.
suicide hacker
Archive
Trojan Horse
human-based social engineering
24. Computer software or hardware that can intercept and log traffic passing over a digital network.
Crossover Error Rate (CER)
Mantrap
sniffer
Hacks with permission
25. ICMP Type/Code 3
Destination Unreachable
Denial of Service (DoS)
HTTP tunneling
Daisy Chaining
26. A set of hardware - software - people - policies - and procedures needed to create - manage - distribute - use - store - and revoke digital certificates.
NetBus
Confidentiality
intrusion detection system (IDS)
public key infrastructure (PKI)
27. A type of denial-of-service attack where a hacker sends thousands of SYN packets to the target with spoofed IP addresses.
social engineering
SYN attack
routed protocol
Last In First Out (LIFO)
28. The subjective - potential percentage of loss to a specific asset if a specific threat is realized. The exposure factor (EF) is a subjective value the person assessing risk must define.
-PI
Extensible Authentication Protocol (EAP)
Exposure Factor
hashing algorithm
29. A type of malware that covertly collects information about a user.
spyware
-PB
-PI
phishing
30. A penetration test in which the ethical hacker has limited knowledge of the intended target(s). Designed to simulate an internal - but non-systemadministrator-level attack.
Smurf attack
gray box testing
protocol stack
Back orifice
31. TCP Ping
parallel scan
Bluetooth
patch
-PT
32. A wireless LAN device that acts as a central point for all wireless traffic. The AP is connected to both the wireless LAN and the wired LAN - providing wireless clients access to network resources.
Defines legal email marketing
Tunneling Virus
Access Point (AP)
polymorphic virus
33. Sending packets or requests to another system to gain information to be used to identify weaknesses and protect the system from attacks.
intrusion detection system (IDS)
Vulnerability Scanning
sniffer
key exchange protocol
34. The act of using numerous electronic serial numbers on a cell phone until a valid number is located.
A series of messages sent by someone attempting to break into a computer to learn about the computer's network services.
personal identification number (PIN)
Tumbling
ISO 17799
35. In computer security - this is an algorithm that uses separate keys for encryption and decryption.
Asymmetric Algorithm
Administratively Prohibited
Cache
Wi-Fi Protected Access (WPA)
36. The use of deceptive computer-based means to trick individuals into disclosing sensitive personal information
polymorphic virus
phishing
Exploit
intrusion detection system (IDS)
37. A term trademarked by the Wi-Fi Alliance - used to define a standard for devices to use to connect to a wireless network.
asynchronous transmission
Wi-Fi
File Transfer Protocol (FTP)
key exchange protocol
38. Port 389
CIA triangle
Secure Multipurpose Mail Extension (S/MIME)
LDAP
shrink-wrap code attacks
39. A hacker who aims to bring down critical infrastructure for a 'cause' and does not worry about the penalties associated with his actions.
File Transfer Protocol (FTP)
suicide hacker
Archive
Competitive Intelligence
40. A value used to control cryptographic operations - such as decryption -encryption - signature generation - and signature verification.
quality of service (QoS)
EDGAR database
heuristic scanning
Cryptographic Key
41. Port 80/81/8080
Banner Grabbing
steganography
Client
HTTP
42. A unit of information formatted according to specific protocols that allows precise transmittal of data from one network node to another. Also called a datagram or data packet - a packet contains a header (container) and a payload (contents). Any IP
Virtual Private Network (VPN)
Trusted Computer Base (TCB)
packet
-oA
43. A cell phone attack in which the serial number from one cell phone is copied to another in an effort to copy the cell phone.
S
Cloning
SSH
security controls
44. A computer system that performs tasks dictated by an attacker from a remote location. Zombies may be active or idle - and owners of the systems generally do not know their systems are compromised.
RxBoot
Unicode
Block Cipher
Zombie
45. A technology that establishes a tunnel to create a private - dedicated - leased-line network over the Internet. The data is encrypted so it's readable only by the sender and receiver. Companies commonly use VPNs to allow employees to connect securely
Timestamping
Multipartite virus
Virtual Private Network (VPN)
-sR
46. A storage buffer that transparently stores data so future requests for the same data can be served faster.
Cache
port redirection
Minimum acceptable level of risk
ad hoc mode
47. Defined in RFC 826 - ARP is a protocol used to map a known IP address to a physical (MAC) address.
fragmentation
Address Resolution Protocol (ARP)
Application-Level Attacks
Trapdoor Function
48. FIN Scan
source routing
-sF
Bug
Lightweight Directory Access Protocol (LDAP)
49. The act of dialing all numbers within an organization to discover open modems.
War Dialing
Hypertext Transfer Protocol Secure (HTTPS)
sniffer
operating system attack
50. An enumeration technique used to provide information about a computer system; generally used for operating system identification (also known as fingerprinting).
RID Resource identifier
SNMP
Packet Internet Groper (ping)
Banner Grabbing