SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. An electronic version of junk mail. Unsolicited commercial e-mail sent to numerous recipients.
spam
signature scanning
reverse lookup; reverse DNS lookup
Request for Comments (RFC)
2. A device set up to send a response on behalf of an end node to the requesting host. Proxies are generally used to obfuscate the host from the Internet.
Simple Mail Transfer Protocol (SMTP)
proxy server
No previous knowledge of the network
Audit Data
3. Incremental Substitution
Replacing numbers in a url to access other files
Defense in Depth
Trusted Computer System Evaluation Criteria (TCSEC)
Cache
4. Physical socket provided on routers and switches for cable connections between a computer and the router/switch. This connection enables the computer to configure - query - and troubleshoot the router/switch by use of a terminal emulator and a comman
Presentation layer
Trojan Horse
Console Port
Videocipher II Satellite Encryption System
5. ICMP Netmask
-PM
Cookie
pattern matching
Interior Gateway Protocol (IGP)
6. A form of fraud in which someone pretends to be someone else by assuming that person's identity - typically in order to access resources or obtain credit and other benefits in that person's name.
identity theft
Defense in Depth
Fraud and related activity in connection with computers
Assessment
7. A computer network confined to a relatively small area - such as a single building or campus - in which devices connect through high-frequency radio waves using IEEE standard 802.11.
security by obscurity
Third Party
reconnaissance
Wireless Local Area Network (WLAN)
8. An Application layer protocol for managing devices on an IP network.
Simple Network Management Protocol (SNMP)
impersonation
forwarding
source routing
9. ACK Scan
-sA
POP 3
Virus
Black Hat
10. A query and response protocol widely used for querying databases that store the registered users or assignees of an Internet resource - such as a domain name - an IP address - or an autonomous system.
spyware
Zone transfer
-sW
Whois
11. A situation in which an IDS or other sensor triggers on an event as an intrusion attempt - when it was actually legitimate traffic.
R
-b
false negative
Echo request
12. A simple PPP authentication mechanism in which the user name and password are transmitted in clear text to prove identity. PAP compares the user name and password to a table listing authorized users.
piggybacking
-oX
secure channel
Password Authentication Protocol (PAP)
13. ICMP Type/Code 3-13
Rijndael
Internet Protocol Security (IPSec) architecture
Open System Interconnection (OSI) Reference Model
Administratively Prohibited
14. A hacking method for stealing the cookies used during a session build and replaying them for unauthorized connection purposes.
Macro virus
open source
sidejacking
Institute of Electrical and Electronics Engineers (IEEE)
15. An organization's threshold for the seven areas of information security responsibility. This level is established based on the objectives for maintaining confidentiality - integrity - and availability of the organization's IT assets and infrastructur
key exchange protocol
A series of messages sent by someone attempting to break into a computer to learn about the computer's network services.
Minimum acceptable level of risk
overt channel
16. Controls internal to a system designed to resolve vulnerabilities and errors soon after they arise.
Corrective Controls
SSH
spoofing
Transport Layer Security (TLS)
17. 18 U.S.C. 1029
Sign in Seal
Annualized Loss Expectancy (ALE)
Possession of access devices
LDAP
18. Port 88
Kerberos
local area network (LAN)
Secure Sockets Layer (SSL)
INFOSEC Assessment Methodology (IAM)
19. The process of using an application to remotely identify open ports on a system (for example - whether systems allow connections through those ports).
Ethernet
Auditing
Vulnerability Management
port scanning
20. LAN standard - defined by ANSI X3T9.5 - specifying a 100Mbps token-passing network using fiber-optic cable and a dualring architecture for redundancy - with transmission distances of up to two kilometers.
-sV
promiscuous mode
Fiber Distributed Data Interface (FDDI)
Covert Channel
21. A denial-of-service technique that uses numerous hosts to perform the attack.
Distributed DoS (DDoS)
Fiber Distributed Data Interface (FDDI)
out-of-band signaling
Bluejacking
22. An industry standard protocol used for accessing and managing information within a directory service; an application protocol for querying and modifying data using directory services running over TCP/IP.
parameter tampering
Lightweight Directory Access Protocol (LDAP)
heuristic scanning
false rejection rate (FRR)
23. A physical security attack where the attacker sifts through garbage and recycle bins for information that may be useful on current and future attacks
security kernel
Authentication
LDAP
Dumpster Diving
24. A symmetric key cipher where plaintext bits are combined with a pseudo-random cipher bit stream (keystream) - typically by an exclusive-or (XOR) operation. In a stream cipher the plaintext digits are encrypted one at a time - and the transformation o
Ethical Hacker
stream cipher
packet
Eavesdropping
25. A protocol that allows a client computer to request services from a server and the server to return the results.
Multipartite virus
Due Diligence
remote procedure call (RPC)
Audit Data
26. An evaluation consisting of a document review - interviews - and demonstrations. No hands-on testing is performed.
Virus Hoax
self encrypting
-PT
Level I assessment
27. The act of dialing all numbers within an organization to discover open modems.
War Dialing
Transport Layer Security (TLS)
stream cipher
Syslog
28. A standard for encrypting and authenticating MIME data; used primarily for Internet e-mail.
public key infrastructure (PKI)
Secure Multipurpose Mail Extension (S/MIME)
penetration testing
-sA
29. An enumeration technique used to provide information about a computer system; generally used for operating system identification (also known as fingerprinting).
Banner Grabbing
Secure Multipurpose Mail Extension (S/MIME)
Videocipher II Satellite Encryption System
Defines legal email marketing
30. A method used to prevent IDS detection by dividing the request into multiple parts that are sent in different packets
port knocking
session splicing
script kiddie
Collision Domain
31. White hat
Electronic Code Book (ECB)
Hypertext Transfer Protocol (HTTP)
Hacks with permission
security controls
32. A card with a built-in microprocessor and memory used for identification or financial transactions. The card transfers data to and from a central computer when inserted into a reader.
smart card
Domain Name System (DNS) cache poisoning
Antivirus (AV) software
asynchronous transmission
33. The transmission of digital signals without precise clocking or synchronization.
honeynet
routed protocol
asynchronous transmission
gateway
34. A formal set of rules describing data transmission - especially across a network. A protocol determines the type of error checking - the data compression method - how the sending device will indicate completion - how the receiving device will indicat
War Driving
Tumbling
Level III assessment
protocol
35. The act of searching for Wi-Fi wireless networks by a person in a moving vehicle - using a portable device.
Asymmetric
CNAME record
Anonymizer
War Driving
36. An organization composed of engineers - scientists - and students who issue standards related to electrical - electronic - and computer engineering.
network operations center (NOC)
-PI
overt channel
Institute of Electrical and Electronics Engineers (IEEE)
37. Transmission using channels or frequencies outside those normally used for data transfer; often used for error reporting.
Interior Gateway Protocol (IGP)
War Chalking
out-of-band signaling
personal identification number (PIN)
38. Port 22
node
U P F
-PI
SSH
39. A well-known and studied phenomenon of human nature - whereby a single trait influences the perception of other traits.
halo effect
hardware keystroke logger
Secure Multipurpose Mail Extension (S/MIME)
null session
40. A communications channel that is being used for a purpose it was not intended for - usually to transfer information secretly.
hacktivism
Network Basic Input/Output System (NetBIOS)
security controls
Covert Channel
41. The Security Accounts Manager file in Windows stores all the password hashes for the system.
John the Ripper - LOphtcrack - Ophtcrack - Cain and Abel
SAM
hash
Minimum acceptable level of risk
42. A standard for encrypting e-mail - web pages - and other stream-oriented information transmitted over the Internet.
Reconnaissance - Scanning - Gaining Access - Maintaining Access - Covering Tracks
Hypertext Transfer Protocol Secure (HTTPS)
Transport Layer Security (TLS)
White Box Testing
43. A software license agreement; a contract between the 'licensor' and purchaser establishing the right to use the software.
Data Link layer
Competitive Intelligence
node
End User Licensing Agreement (EULA)
44. The process of determining if a network entity (user or service) is legitimate
Authentication
Institute of Electrical and Electronics Engineers (IEEE)
replay attack
DNS enumeration
45. The process of embedding information into a digital signal in a way that makes it difficult to remove.
Digital Watermarking
Annualized Loss Expectancy (ALE)
heuristic scanning
parallel scan & 300 sec timeout & 1.25 sec/probe
46. A program designed to execute at a specific time to release malicious code onto the computer system or network.
Time Bomb
-PB
network tap
-sL
47. The software product or system that is the subject of an evaluation.
Tunneling
Target Of Engagement (TOE)
Traceroute
penetration testing
48. Controlling access to a network by analyzing the headers of incoming and outgoing packets - and letting them pass or discarding them based on rule sets created by a network administrator. A packet filter allows or denies packets based on destination
Password Authentication Protocol (PAP)
Challenge Handshake Authentication Protocol (CHAP)
Covert Channel
packet filtering
49. A piece of code intentionally inserted into a software system that will perform a malicious function when specified conditions are met at some future point.
Challenge Handshake Authentication Protocol (CHAP)
logic bomb
separation of duties
802.11 i
50. A file system used by the Mac OS.
Warm Site
Decryption
Hierarchical File System (HFS)
Due Care
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests