SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Aggressive scan timing
protocol
social engineering
Antivirus (AV) software
parallel scan & 300 sec timeout & 1.25 sec/probe
2. A situation in which an IDS or other sensor triggers on an event as an intrusion attempt - when it was actually legitimate traffic.
false negative
remote procedure call (RPC)
Tini
802.11 i
3. Using conversation or some other interaction between people to gather useful information.
Competitive Intelligence
parallel scan & 75 sec timeout & 0.3 sec/probe
NetBSD
human-based social engineering
4. An unknown deficiency in software or some other product that results in a security vulnerability being identified.
MD5
reconnaissance
security defect
Finger
5. Security measures - such as a locked door - perimeter fence - or security guard - to prevent or deter physical access to a facility - resource - or information stored on physical media.
serial scan & 300 sec wait
physical security
Discretionary Access Control (DAC)
Event
6. Authentication confirms the identity of the user or device. Authorization determines the privileges (rights) of the user or device. Accounting records the access attempts - both successful and unsuccessful.
logic bomb
SAM
Tini
Authentication - Authorization - and Accounting (AAA)
7. Start of Authority record. This record identifies the primary name server for the zone. The SOA record contains the host name of the server responsible for all DNS records within the namespace - as well as the basic properties of the domain.
parallel scan & 300 sec timeout & 1.25 sec/probe
net use \[target ip]IPC$ '' /user:''
SOA record
Droppers
8. Malicious code that uses a polymorphic engine to mutate while keeping the original algorithm intact; the code changes itself each time it runs - but the function of the code will not change.
CIA triangle
Administratively Prohibited
serialize scans & 0.4 sec wait
polymorphic virus
9. A denial-of-service technique that uses numerous hosts to perform the attack.
out-of-band signaling
Authentication Header (AH)
Distributed DoS (DDoS)
Uniform Resource Locator (URL)
10. Policy stating what users of a system can and cannot do with the organization's assets.
Computer Emergency Response Team (CERT)
Database
Acceptable Use Policy (AUP)
End User Licensing Agreement (EULA)
11. One or more locations from which control is exercised over a computer - television broadcast - or telecommunications network.
Address Resolution Protocol (ARP)
network operations center (NOC)
null session
Multipartite virus
12. A utility that traces a packet from your computer to an Internet host - showing how many hops the packet takes to reach the host and how long the packet requires to complete the hop.
Traceroute
Backdoor
symmetric encryption
public key infrastructure (PKI)
13. An attack where the hacker repeats a portion of a cryptographic exchange in hopes of fooling the system into setting up a communications channel.
replay attack
symmetric encryption
Password Authentication Protocol (PAP)
polymorphic virus
14. Traffic-passing technique used by bridges and switches in which traffic received on an interface is sent out all interfaces on the device except the interface on which the information was originally received. Traffic on a switch is flooded when it is
flood
Zero Subnet
National Security Agency
Countermeasures
15. All measures and techniques taken to gather information about an intended target. Footprinting can be passive or active.
Point-to-Point Protocol (PPP)
footprinting
Zero Subnet
Annualized Loss Expectancy (ALE)
16. White box test
Internal access to the network
security bulletins
Digital Watermarking
Certificate
17. Software used to bind a Trojan and a legitimate program together so the Trojan will be installed when the legitimate program is executed.
Wrapper
separation of duties
ring topology
Decryption
18. A virus written in a macro language and usually embedded in document or spreadsheet files.
replay attack
Point-to-Point Tunneling Protocol (PPTP)
Redundant Array of Independent Disks (RAID)
Macro virus
19. A malicious computer program with self-replication capabilities that attaches to another file and moves with the host from one computer to another.
Tunnel
Authentication
non-repudiation
Virus
20. The process of embedding information into a digital signal in a way that makes it difficult to remove.
Smurf attack
Digital Watermarking
--randomize_hosts -O OS fingerprinting
Blowfish
21. A query and response protocol widely used for querying databases that store the registered users or assignees of an Internet resource - such as a domain name - an IP address - or an autonomous system.
key exchange protocol
Whois
Timestamping
Bit Flipping
22. A string that represents the location of a web resource
A R
Uniform Resource Locator (URL)
Countermeasures
Zenmap
23. A computer system that performs tasks dictated by an attacker from a remote location. Zombies may be active or idle - and owners of the systems generally do not know their systems are compromised.
Zone transfer
Web Spider
Zombie
-sT
24. A card with a built-in microprocessor and memory used for identification or financial transactions. The card transfers data to and from a central computer when inserted into a reader.
Time To Live (TTL)
SOA record
smart card
session splicing
25. A value used to control cryptographic operations - such as decryption -encryption - signature generation - and signature verification.
Vulnerability Scanning
Cryptographic Key
Tiger Team
RPC-DCOM
26. SYN Ping
-PS
Administratively Prohibited
Mantrap
Certificate Authority (CA)
27. A record showing which user has accessed a given resource and what operations the user performed during a given period.
Tiger Team
Due Care
quantitative risk assessment
Audit Trail
28. Sending packets or requests to another system to gain information to be used to identify weaknesses and protect the system from attacks.
Vulnerability Scanning
-sP
gray hat
spoofing
29. A method of external testing whereby several systems or resources are used together to effect an attack.
Simple Mail Transfer Protocol (SMTP)
Daisy Chaining
secure channel
RxBoot
30. Layer 2 of the OSI reference model. This layer provides reliable transit of data across a physical link. The Data Link layer is concerned with physical addressing - network topology - access to the network medium - error detection - sequential delive
Data Link layer
Due Care
Telnet
Covert Channel
31. A device providing temporary - on-demand - point-to-point network access to users.
network access server
Kerberos
remote procedure call (RPC)
Open System Interconnection (OSI) Reference Model
32. The process of sending a packet or frame toward the destination. In a switch - messages are forwarded only to the port they are addressed to.
Uniform Resource Locator (URL)
Request for Comments (RFC)
Zombie
forwarding
33. Network Scanning
Address Resolution Protocol (ARP) table
Level II assessment
Wired Equivalent Privacy (WEP)
A procedure for identifying active hosts on a network.
34. Any kind of connection that allows you to see all traffic passing by. Generally used in reference to a NIDS (network-based IDS) to monitor all traffic.
Multipurpose Internet Mail Extensions (MIME)
network tap
route
intrusion detection system (IDS)
35. A section or subset of the network. Often a router or other routing device provides the end point of the segment.
Cache
segment
Third Party
Acknowledgment (ACK)
36. The monetary loss that can be expected for an asset due to risk over a one-year period. ALE is the product of the annual rate of occurrence (ARO) and the single loss expectancy (SLE). It is mathematically expressed as ALE = ARO
Countermeasures
Annualized Loss Expectancy (ALE)
infrastructure mode
Trojan Horse
37. A social-engineering attack using computer resources - such as e-mail or IRC.
Computer-Based Attack
initial sequence number (ISN)
Electronic Code Book (ECB)
parallel scan & 300 sec timeout & 1.25 sec/probe
38. A hacker who aims to bring down critical infrastructure for a 'cause' and does not worry about the penalties associated with his actions.
suicide hacker
SSH
Exploit
symmetric algorithm
39. Transmission using channels or frequencies outside those normally used for data transfer; often used for error reporting.
out-of-band signaling
Discretionary Access Control (DAC)
HIDS
-PB
40. A limited-function version of the Internetworking Operating System (IOS) - held in read-only memory in some earlier models of Cisco devices - capable of performing several seldom-needed low-level functions such as loading a new IOS into Flash memory
Macro virus
Computer Emergency Response Team (CERT)
iris scanner
RxBoot
41. A software license agreement; a contract between the 'licensor' and purchaser establishing the right to use the software.
Threat
Telnet
Level I assessment
End User Licensing Agreement (EULA)
42. A physical security attack where the attacker sifts through garbage and recycle bins for information that may be useful on current and future attacks
Point-to-Point Protocol (PPP)
Acknowledgment (ACK)
Asynchronous
Dumpster Diving
43. An attack technique that tricks your DNS server into believing it has received authentic information when - in reality - it has been provided fraudulent data. DNS cache poisoning affects user traffic by sending it to erroneous or malicious end points
Reconnaissance - Scanning - Gaining Access - Maintaining Access - Covering Tracks
ECHO reply
Domain Name System (DNS) cache poisoning
Black Box Testing
44. A method for detecting malicious code on a computer where the files are compared to signatures of known viruses stored in a database.
Digital Watermarking
signature scanning
Web Spider
Trusted Computer System Evaluation Criteria (TCSEC)
45. The act or actions of a hacker to put forward a cause or a political agenda - to affect some societal change - or to shed light on something he feels to be political injustice. These activities are usually illegal in nature.
audit
out-of-band signaling
packet filtering
hacktivism
46. The security property that data is not modified in an unauthorized and undetected manner. Also - the principle and measures taken to ensure that data received is in the exact same condition and state as when it was originally transmitted.
Authentication
serial scan & 300 sec wait
A R
integrity
47. Actions - devices - procedures - techniques - or other measures intended to reduce the vulnerability of an information system.
Whois
-sI
Countermeasures
Denial of Service (DoS)
48. A proprietary - open - wireless technology used for transferring data from fixed and mobile devices over short distances.
open source
Bluetooth
payload
router
49. Literally - 'not balanced or the same.' In computing - asymmetric refers to a difference in networking speeds upstream to downstream. In cryptography - it's the use of more than one key for encryption/authentication purposes.
pattern matching
Asymmetric
Domain Name System (DNS) cache poisoning
Biometrics
50. A protocol for exchanging packets over a serial line.
Algorithm
session splicing
Macro virus
Serial Line Internet Protocol (SLIP)