SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A security protocol used in IEEE 802.11i to replace WEP without the requirement to replace legacy hardware.
quality of service (QoS)
routed protocol
Vulnerability Management
Temporal Key Integrity Protocol (TKIP)
2. A unique numerical string - created by a hashing algorithm on a given piece of data - used to verify data integrity. Generally hashes are used to verify the integrity of files after download (comparison to the hash value on the site before download)
Password Authentication Protocol (PAP)
hash
Timestamping
Service Set Identifier (SSID)
3. Access by information systems (or users) communicating from outside the information system security perimeter.
Asymmetric
serialize scans & 15 sec wait
remote access
Tunnel
4. A pen testing method where the attacker knows all information about the internal network. It is designed to simulate an attack by a disgruntled systems administrator - or similar level.
SMB
Internet Protocol (IP)
White Box Testing
HIDS
5. A utility that sends an ICMP Echo message to determine if a specific IP address is accessible; if the message receives a reply - the address is reachable.
Competitive Intelligence
POP 3
Fiber Distributed Data Interface (FDDI)
Packet Internet Groper (ping)
6. The potential for damage to or loss of an IT asset
rootkit
open source
risk
-PT
7. A point-to-point connection between two endpoints created to exchangedata. Typically a tunnel is either an encrypted connection - or a connection using a protocol in a method for which it was not designed. An encrypted connection forms a point-to-poi
Tunnel
Detective Controls
security kernel
pattern matching
8. A method of network traffic filtering that monitors the entire communications process - including the originator of the session and from which direction it started.
The automated process of proactively identifying vulnerabilities of computing systems present in a network
stateful packet filtering
Web Spider
risk avoidance
9. The level of importance assigned to an IT asset
false rejection rate (FRR)
Trusted Computer Base (TCB)
Information Technology (IT) asset criticality
route
10. An attack with the goal of preventing authorized users from accessing services and preventing the normal operation of computers and networks.
Denial of Service (DoS)
Password Authentication Protocol (PAP)
penetration testing
false negative
11. TCP Ping
role-based access control
-PT
EDGAR database
Trojan Horse
12. A suite of protocols used for securing Internet Protocol (IP) communications by authenticating and encrypting each IP packet of a communication session. This suite includes protocols for establishing mutual authentication between agents at the sessio
Internet Protocol Security (IPSec) architecture
HIDS
OpenBSD
Hypertext Transfer Protocol Secure (HTTPS)
13. An unknown deficiency in software or some other product that results in a security vulnerability being identified.
Routing Protocol
Cookie
security defect
Sign in Seal
14. Aggressive scan timing
Directory Traversal
parallel scan & 300 sec timeout & 1.25 sec/probe
forwarding
Echo Reply
15. Wrapper or Binder
Real application encompassing Trojan
National Security Agency
Fast Ethernet
Banner Grabbing
16. The process of attaching a particular protocol header and trailer to a unit of data before transmission on the network. Occurs at layer 2 of the OSI reference model.
parallel scan & 75 sec timeout & 0.3 sec/probe
encapsulation
CNAME record
social engineering
17. A business - government agency - or educational institution that provides access to the Internet.
sniffer
network tap
Internet service provider (ISP)
fragmentation
18. A domain composed of all the systems sharing any given physical transport media. Systems within a collision domain may collide with each other during the transmission of data. Collisions can be managed by CSMA/CD (collision detection) or CSMA/CA (col
steganography
Administratively Prohibited
Collision Domain
Confidentiality
19. A self-replicating malicious program that attempts installation beneath antivirus software by directly intercepting the interrupt handlers of the operating system to evade detection.
Tunneling Virus
false negative
CIA triangle
port redirection
20. A unique hostname that is used to identify resources on the Internet. Domain names start with a root (.) - then add a top level (.com - .gov - or .mil - for example) - and a given name space.
Domain Name
Traceroute
intrusion detection system (IDS)
CNAME record
21. A network traffic management technique designed to allow applications to specify the route a packet will take to a destination - regardless of what the route tables between the two systems say.
National Security Agency
flood
Interior Gateway Protocol (IGP)
source routing
22. Vulnerability Scanning
Black Box Testing
social engineering
The automated process of proactively identifying vulnerabilities of computing systems present in a network
Telnet
23. A device that receives and sends data packets between two or more networks; the packet headers and a forwarding table provide the router with the information necessary for deciding which interface to use to forward packets.
route
queue
router
Banner Grabbing
24. A security protocol for wireless local area networks defined in the 802.11b standard; intended to provide the same level of security as a wired LAN. WEP is not considered strong security - although it does authenticate clients to access points - encr
Active Attack
A R
hash
Wired Equivalent Privacy (WEP)
25. UDP Scan
Domain Name
remote access
non-repudiation
-sU
26. An international organization composed of national standards bodies from over 75 countries. Developed the OSI reference model.
hardware keystroke logger
sniffer
International Organization for Standardization (ISO)
Back orifice
27. Network Scanning
hash
Certificate
A procedure for identifying active hosts on a network.
Eavesdropping
28. A step-by-step method of solving a problem. In computing security - an algorithm is a set of mathematical rules (logic) for the process of encryption and decryption
Algorithm
-sP
-PP
-sV
29. The act of searching for Wi-Fi wireless networks by a person in a moving vehicle - using a portable device.
Vulnerability Scanning
spoofing
Echo Reply
War Driving
30. CAN-SPAM
Time To Live (TTL)
-oG
Defines legal email marketing
Multipartite virus
31. The Security Accounts Manager file in Windows stores all the password hashes for the system.
Information Technology (IT) infrastructure
-sL
-sX
SAM
32. The science or study of protecting information - whether in transit or at rest - by using techniques to render the information unusable to anyone who does not possess the means to decrypt it.
honeypot
Cryptography
Digital Signature
-oN
33. Policy stating what users of a system can and cannot do with the organization's assets.
footprinting
Vulnerability Management
Acceptable Use Policy (AUP)
asynchronous transmission
34. The last portion of the SID that identifies the user to the system in Windows. A RID of 500 identifies the administrator account.
Service Set Identifier (SSID)
RID Resource identifier
fully qualified domain name (FQDN)
John the Ripper - LOphtcrack - Ophtcrack - Cain and Abel
35. A networking configuration where all nodes are connected in a circle with no terminated ends on the cable.
Post Office Protocol 3 (POP3)
ring topology
Decryption
Domain Name System (DNS) lookup
36. A security tool designed to protect a system or network against attacks by comparing traffic patterns against a list of both known attack signatures and general characteristics of how attacks may be carried out. Threats are rated and reported.
Fraud and related activity in connection with computers
passive attack
Syslog
intrusion detection system (IDS)
37. A hybrid of the HTTP and SSL/TLS protocols that provides encrypted communication and secure identification of a web server.
Hypertext Transfer Protocol Secure (HTTPS)
Domain Name
payload
-sP
38. An evaluation conducted to determine the potential for damage to or loss of an IT asset.
Black Hat
gateway
risk assessment
Demilitarized Zone (DMZ)
39. A network administration command-line tool available for many operating systems for querying the Domain Name System (DNS) to obtain domain name or IP address mappings or any other specific DNS record.
Bug
Computer Emergency Response Team (CERT)
SYN attack
nslookup
40. A nonroutable IP address range intended for use only within the confines of a single organization - falling within the predefined ranges of 10.0.0.0 - 172.16-31.0.0 - or 192.168.0.0.
Banner Grabbing
OpenBSD
rootkit
private network address
41. A NAT method in which multiple internal hosts - using private IP addressing - can be mapped through a single public IP address using the session IDs and port numbers. An internal global IP address can support in excess of 65 -000 concurrent TCP and U
Written Authorization
Port Address Translation (PAT)
rule-based access control
inference attack
42. A command used in HTTP and FTP to retrieve a file from a server.
Zero Subnet
GET
Discretionary Access Control (DAC)
Echo request
43. A connection-oriented - layer 4 protocol for transporting data over network segments. TCP is considered reliable because it guarantees delivery and the proper reordering of transmitted packets. This protocol is used for most long-haul traffic on the
Wide Area Network (WAN)
Kerberos
Transmission Control Protocol (TCP)
ad hoc mode
44. A group of penetration testers that assess the security of an organization - which is often unaware of the existence of the team or the exact assignment.
Trusted Computer System Evaluation Criteria (TCSEC)
suicide hacker
enumeration
red team
45. Formal description and evaluation of the vulnerabilities in an information system
security controls
Vulnerability Assessment
Domain Name System (DNS) cache poisoning
Mantrap
46. ICMP Netmask
-sF
security by obscurity
patch
-PM
47. A set of exclusive rights granted by the law of a jurisdiction to the author or creator of an original work - including the right to copy - distribute - and adapt the work.
inference attack
Copyright
LDAP
Access Creep
48. A computer placed outside a firewall to provide public services to other Internet sites - and hardened to resist external attacks.
signature scanning
Bastion host
-sA
pattern matching
49. An Application layer protocol used primarily by Microsoft Windows to provide shared access to printers - files - and serial ports. It also provides an authenticated interprocess communication mechanism.
segment
Common Internet File System/Server Message Block
steganography
Fiber Distributed Data Interface (FDDI)
50. A proprietary - open - wireless technology used for transferring data from fixed and mobile devices over short distances.
Bluetooth
INFOSEC Assessment Methodology (IAM)
Adware
Level I assessment