SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The software product or system that is the subject of an evaluation.
Target Of Engagement (TOE)
Routing Information Protocol (RIP)
script kiddie
encryption
2. Port 389
Zone transfer
LDAP
infrastructure mode
Mantrap
3. A person or entity indirectly involved in a relationship between two principles.
Third Party
security incident response team (SIRT)
Certificate Authority (CA)
Address Resolution Protocol (ARP) table
4. An e-mail message warning users of a nonexistent virus and encouraging them to pass on the message to other users.
signature scanning
Digital Signature
Virus Hoax
integrity
5. A piece of software - provided by the vendor - intended to update or fix known - discovered problems in a computer program or its supporting data.
Eavesdropping
patch
Target Of Engagement (TOE)
gray box testing
6. Attacks that take advantage of the built-in code and scripts most off-the-shelf applications come with.
Mandatory access control (MAC)
shrink-wrap code attacks
footprinting
Block Cipher
7. An attack where the hacker manipulates parameters within the URL string in hopes of modifying data.
-sA
parameter tampering
impersonation
Daemon
8. A section or subset of the network. Often a router or other routing device provides the end point of the segment.
security bulletins
segment
public key
Tumbling
9. Any item of value or worth to an organization - whether physical or virtual.
Asset
Certificate
Wired Equivalent Privacy (WEP)
heuristic scanning
10. Independent review and examination of records and activities to assess the adequacy of system controls - to ensure compliance with established policies and operational procedures - and to recommend necessary changes.
rogue access point
Availability
audit
Vulnerability Management
11. A decision to reduce the potential for damage to or loss of an IT asset by taking some type of action
risk avoidance
reverse social engineering
Trusted Computer System Evaluation Criteria (TCSEC)
Accountability
12. An international organization composed of national standards bodies from over 75 countries. Developed the OSI reference model.
security controls
-oN
International Organization for Standardization (ISO)
Service Set Identifier (SSID)
13. An authentication method on point-to-point links - using a three-way handshake and a mutually agreed-upon key.
hardware keystroke logger
Challenge Handshake Authentication Protocol (CHAP)
packet filtering
route
14. A program designed to browse websites in an automated - methodical manner. Sometimes these programs are used to harvest information from websites - such as e-mail addresses.
Unicode
Event
script kiddie
Web Spider
15. The result of using a private key to encrypt a hash value for identification purposes within a PKI system. The signature can be decoded by the originator's public key - verifying his identity and providing non-repudiation. A valid digital signature g
patch
802.11
Digital Signature
-sP
16. Conversion of plaintext to ciphertext through the use of a cryptographic algorithm.
encryption
Kerberos
Secure Sockets Layer (SSL)
-PB
17. A security tool designed to protect a system or network against attacks by comparing traffic patterns against a list of both known attack signatures and general characteristics of how attacks may be carried out. Threats are rated and reported.
Buffer
Three-Way (TCP) Handshake
intrusion detection system (IDS)
Buffer Overflow
18. MAC Flooding
Virus
Zone transfer
Network Address Translation (NAT)
Overwhelm CAM table to convert switch to hub mode
19. An enumeration technique used to provide information about a computer system; generally used for operating system identification (also known as fingerprinting).
SMB
Availability
Banner Grabbing
hash
20. Hex 04
R
Simple Object Access Protocol (SOAP)
-PB
Baseline
21. The condition of a resource being ready for use and accessible by authorized users.
Threat
Assessment
Availability
RID Resource identifier
22. The exploitation of a security vulnerability
Dumpster Diving
End User Licensing Agreement (EULA)
Bug
security breach or security incident
23. A card with a built-in microprocessor and memory used for identification or financial transactions. The card transfers data to and from a central computer when inserted into a reader.
Fast Ethernet
serialize scans & 15 sec wait
Information Technology Security Evaluation Criteria (ITSEC)
smart card
24. 18 U.S.C. 1029
Tini
suicide hacker
Copyright
Possession of access devices
25. Paranoid scan timing
serial scan & 300 sec wait
gap analysis
-PP
local area network (LAN)
26. nmap
Active Directory (AD)
Echo Reply
--randomize_hosts -O OS fingerprinting
Exposure Factor
27. Any kind of connection that allows you to see all traffic passing by. Generally used in reference to a NIDS (network-based IDS) to monitor all traffic.
shrink-wrap code attacks
network tap
Tunneling Virus
EDGAR database
28. A penetration test in which the ethical hacker has limited knowledge of the intended target(s). Designed to simulate an internal - but non-systemadministrator-level attack.
Post Office Protocol 3 (POP3)
false negative
gray box testing
parallel scan
29. Used for exchanging structured information - such as XML-based messages - in the implementation of web services
Simple Object Access Protocol (SOAP)
TACACS
spoofing
risk avoidance
30. A mathematical operation requiring two binary inputs: If the inputs match - the output is a 0 - otherwise it is a 1.
security controls
Mandatory access control (MAC)
Third Party
XOR Operation
31. Host-based IDS. An IDS that resides on the host - protecting against file and folder manipulation and other host-based attacks and actions.
HIDS
Vulnerability Scanning
Data Encryption Standard (DES)
parallel scan & 300 sec timeout & 1.25 sec/probe
32. A small Trojan program that listens on port 777.
risk assessment
Information Technology Security Evaluation Criteria (ITSEC)
Tini
Access Point (AP)
33. ACK Scan
flood
Asynchronous
-sA
Data Link layer
34. Ports 20/21
scope creep
signature scanning
FTP
Information Technology Security Evaluation Criteria (ITSEC)
35. The cyclical practice of identifying - classifying - remediating - and mitigating vulnerabilities.
Third Party
Vulnerability Management
Authentication Header (AH)
Availability
36. A background process found in Unix - Linux - Solaris - and other Unix-based operating systems.
Directory Traversal
risk transference
Daemon
S
37. Port 22
Authentication Header (AH)
SSH
Level I assessment
RPC-DCOM
38. A type of DNS transfer - where all records from an SOA are transmitted to the requestor. Zone transfers have two options: full (opcode AXFR) and incremental (IXFR).
reverse social engineering
session splicing
Google hacking
Zone transfer
39. A utility that sends an ICMP Echo message to determine if a specific IP address is accessible; if the message receives a reply - the address is reachable.
null session
Packet Internet Groper (ping)
Point-to-Point Protocol (PPP)
Wireless Local Area Network (WLAN)
40. Layer 7 of the OSI reference model. The Application layer provides services to applications - which allow them access to the network. Protocols such as FTP and SMTP reside here.
hash
script kiddie
Application Layer
Certificate Authority (CA)
41. Set of tools (applications or code) that enables administrator-level accessto a computer or computer network and is designed to obscure the fact that the system has been compromised. Rootkits are dangerous malware entities that provide administrator
packet
intrusion prevention system (IPS)
rootkit
404EE
42. A security protocol used in IEEE 802.11i to replace WEP without the requirement to replace legacy hardware.
quantitative risk assessment
Information Technology (IT) asset valuation
SMB
Temporal Key Integrity Protocol (TKIP)
43. An extensible mechanism for e-mail. A variety of MIME types exist for sending content such as audio - binary - or video using the Simple Mail Transfer Protocol (SMTP).
Multipurpose Internet Mail Extensions (MIME)
Routing Information Protocol (RIP)
risk avoidance
Fraud and related activity in connection with computers
44. A protocol used to pass control and error messages between nodes on the Internet.
Packet Internet Groper (ping)
--randomize_hosts -O OS fingerprinting
Internet Control Message Protocol (ICMP)
Decryption
45. Port 110
false rejection rate (FRR)
POP 3
security by obscurity
port redirection
46. Establish Null Session
net use \[target ip]IPC$ '' /user:''
Malware
SSH
security by obscurity
47. The science or study of protecting information - whether in transit or at rest - by using techniques to render the information unusable to anyone who does not possess the means to decrypt it.
ad hoc mode
Computer-Based Attack
Cryptography
Target Of Engagement (TOE)
48. A wireless LAN device that acts as a central point for all wireless traffic. The AP is connected to both the wireless LAN and the wired LAN - providing wireless clients access to network resources.
Access Point (AP)
Information Technology Security Evaluation Criteria (ITSEC)
Digital Signature
audit
49. A pen testing method where the attacker knows all information about the internal network. It is designed to simulate an attack by a disgruntled systems administrator - or similar level.
security breach or security incident
Domain Name System (DNS)
Virus
White Box Testing
50. A device or service designed to obfuscate traffic between a client and the Internet. Generally used to make activity on the Internet as untraceable as possible.
Wired Equivalent Privacy (WEP)
firewall
Anonymizer
Mandatory access control (MAC)
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests