SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Two or more LANs connected by a high-speed line across a large geographical area.
Destination Unreachable
Authentication
Master boot record infector
Wide Area Network (WAN)
2. The exploitation of a security vulnerability
Open System Interconnection (OSI) Reference Model
Web Spider
ad hoc mode
security breach or security incident
3. An application that monitors a computer or network to identify - and prevent - malware. AV is usually signature-based - and can take multiple actions on defined malware files/activity.
Antivirus (AV) software
Tunneling
R
Interior Gateway Protocol (IGP)
4. A point of reference used to mark an initial state in order to manage change.
Audit Data
local area network (LAN)
port knocking
Baseline
5. SYN Ping
-PS
social engineering
Kerberos
International Organization for Standardization (ISO)
6. 18 U.S.C. 1030
overt channel
Archive
Cryptography
Fraud and related activity in connection with computers
7. A VPN tunneling protocol with encryption. PPTP connects two nodes in a VPN by using one TCP port for negotiation and authentication and one IP protocol for data transfer.
Point-to-Point Tunneling Protocol (PPTP)
Syslog
passive attack
polymorphic virus
8. Drawing symbols in public places to alert others to an open Wi-Fi network. War chalking can include the SSIDs - administrative passwords to APs - and other information.
War Chalking
Extensible Authentication Protocol (EAP)
network interface card (NIC)
Trapdoor Function
9. A systematic process for the assessment of security vulnerabilities.
serial scan & 300 sec wait
INFOSEC Assessment Methodology (IAM)
enumeration
TACACS
10. NSA
Crossover Error Rate (CER)
National Security Agency
Due Diligence
-oN
11. Physical socket provided on routers and switches for cable connections between a computer and the router/switch. This connection enables the computer to configure - query - and troubleshoot the router/switch by use of a terminal emulator and a comman
-oA
false negative
Console Port
Malicious code
12. Set of tools (applications or code) that enables administrator-level accessto a computer or computer network and is designed to obscure the fact that the system has been compromised. Rootkits are dangerous malware entities that provide administrator
Acknowledgment (ACK)
flood
rootkit
Fraud and related activity in connection with computers
13. A programming principle whereby the last piece of data added to the stack is the first piece of data taken off.
session hijacking
Last In First Out (LIFO)
Timestamping
public key infrastructure (PKI)
14. An extensible mechanism for e-mail. A variety of MIME types exist for sending content such as audio - binary - or video using the Simple Mail Transfer Protocol (SMTP).
Exploit
Acknowledgment (ACK)
Multipurpose Internet Mail Extensions (MIME)
polymorphic virus
15. A TCP flag notifying an originating station that the preceding packet (or packets) has been received.
Acknowledgment (ACK)
sidejacking
Open System Interconnection (OSI) Reference Model
Presentation layer
16. The act of searching for Wi-Fi wireless networks by a person in a moving vehicle - using a portable device.
War Driving
port scanning
Minimum acceptable level of risk
CIA triangle
17. Hex 12
LDAP
quantitative risk assessment
A S
hardware keystroke logger
18. Ports 20/21
FTP
POST
source routing
Minimum acceptable level of risk
19. A computer virus that infects and spreads in multiple ways.
parallel scan
Multipartite virus
signature scanning
Bluejacking
20. A type of denial-of-service attack where a hacker sends thousands of SYN packets to the target with spoofed IP addresses.
CAM table
Interior Gateway Protocol (IGP)
SYN attack
Malicious code
21. A mathematical operation requiring two binary inputs: If the inputs match - the output is a 0 - otherwise it is a 1.
router
Wide Area Network (WAN)
XOR Operation
parallel scan & 300 sec timeout & 1.25 sec/probe
22. Malware designed to install some sort of virus - backdoor - and so on - on a target system.
suicide hacker
802.11
Active Fingerprinting
Droppers
23. A device set up to send a response on behalf of an end node to the requesting host. Proxies are generally used to obfuscate the host from the Internet.
A
Event
Due Diligence
proxy server
24. A symmetric key cryptographic algorithm that transforms a block of information at a time using a cryptographic key. For a block cipher algorithm - the length of the input block is the same as the length of the output block.
risk acceptance
non-repudiation
Block Cipher
National Security Agency
25. Any network incident that prompts some kind of log entry or other notification.
remote procedure call (RPC)
Event
Local Administrator
separation of duties
26. CAN-SPAM
Defines legal email marketing
out-of-band signaling
Access Control List (ACL)
NetBus
27. A security protocol for wireless local area networks defined in the 802.11b standard; intended to provide the same level of security as a wired LAN. WEP is not considered strong security - although it does authenticate clients to access points - encr
Wired Equivalent Privacy (WEP)
Database
Port Address Translation (PAT)
heuristic scanning
28. A technology that establishes a tunnel to create a private - dedicated - leased-line network over the Internet. The data is encrypted so it's readable only by the sender and receiver. Companies commonly use VPNs to allow employees to connect securely
promiscuous mode
Vulnerability Management
-sX
Virtual Private Network (VPN)
29. As an identification device becomes more sensitive or accurate - its FAR decreases while its FRR increases. The CER is the point at which these two rates are equal - or cross over.
Asynchronous
Decryption
Replacing numbers in a url to access other files
false rejection rate (FRR)
30. An organization's threshold for the seven areas of information security responsibility. This level is established based on the objectives for maintaining confidentiality - integrity - and availability of the organization's IT assets and infrastructur
Minimum acceptable level of risk
forwarding
Internal access to the network
security kernel
31. A communications channel that is being used for a purpose it was not intended for - usually to transfer information secretly.
risk assessment
Covert Channel
HTTP tunneling
SYN attack
32. An Application layer protocol for sending electronic mail between servers.
Exploit
Simple Mail Transfer Protocol (SMTP)
asynchronous transmission
File Allocation Table (FAT)
33. A backlog of packets stored in buffers and waiting to be forwarded over an interface.
ring topology
security by obscurity
queue
physical security
34. The art and science of creating a covert message or image within another message - image - audio - or video file.
network interface card (NIC)
signature scanning
Presentation layer
steganography
35. A computer process that requests a service from another computer and accepts the server's responses.
parallel scan & 75 sec timeout & 0.3 sec/probe
node
Client
false negative
36. A virus that plants itself in a system's boot sector and infects the master boot record.
Active Attack
Boot Sector Virus
ad hoc mode
False Acceptance Rate (FAR)
37. A one-way mathematical function that generates a fixedlength numerical string (hash) from a given data input. MD5 and SHA-1 are hashing algorithms.
Trojan Horse
Covert Channel
POST
hashing algorithm
38. Method used by antivirus software to detect new - unknown viruses that have not yet been identified; based on a piece-by-piece examination of a program - looking for a sequence or sequences of instructions that differentiate the virus from 'normal' p
heuristic scanning
encryption
logic bomb
FreeBSD
39. Attacks on the actual programming code of an application.
Application-Level Attacks
Routing Information Protocol (RIP)
Bluejacking
Internet Assigned Number Authority (IANA)
40. A method in cryptography by which cryptographic keys are exchanged between users - allowing use of a cryptographic algorithm (for example - the Diffie-Hellman key exchange).
Cloning
INFOSEC Assessment Methodology (IAM)
key exchange protocol
Minimum acceptable level of risk
41. Network Scanning
Tunneling
A procedure for identifying active hosts on a network.
Malicious code
Contingency Plan
42. A Windows-based GUI version of nmap.
Challenge Handshake Authentication Protocol (CHAP)
risk assessment
Hacks without permission
Zenmap
43. The security property that data is not modified in an unauthorized and undetected manner. Also - the principle and measures taken to ensure that data received is in the exact same condition and state as when it was originally transmitted.
Crossover Error Rate (CER)
-p <port ranges>
integrity
Uniform Resource Locator (URL)
44. The software product or system that is the subject of an evaluation.
Target Of Engagement (TOE)
Web Spider
A S
Authentication - Authorization - and Accounting (AAA)
45. A record showing which user has accessed a given resource and what operations the user performed during a given period.
gap analysis
War Chalking
Audit Trail
Point-to-Point Protocol (PPP)
46. Port 23
Archive
-PS
sheepdip
Telnet
47. Controlling access to a network by analyzing the headers of incoming and outgoing packets - and letting them pass or discarding them based on rule sets created by a network administrator. A packet filter allows or denies packets based on destination
hardware keystroke logger
Biometrics
serial scan & 300 sec wait
packet filtering
48. A security objective that ensures a resource can be accessed only by authorized users. This is also the property that sensitive information is not disclosed to unauthorized individuals - entities - or processes.
Black Box Testing
Finding a directory listing and gaining access to a parent or root file for access to other files
Confidentiality
SOA record
49. A domain composed of all the systems sharing any given physical transport media. Systems within a collision domain may collide with each other during the transmission of data. Collisions can be managed by CSMA/CD (collision detection) or CSMA/CA (col
Anonymizer
Digital Watermarking
role-based access control
Collision Domain
50. Provides router-to-router or host-to-network connections over asynchronous and synchronous circuits.
gray box testing
Vulnerability Assessment
Point-to-Point Protocol (PPP)
Internal access to the network