SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A method of external testing whereby several systems or resources are used together to effect an attack.
router
Daisy Chaining
hashing algorithm
Packet Internet Groper (ping)
2. A fully operational off-site data-processing facility equipped with hardware and system software to be used in the event of a disaster.
Virus
hot site
National Security Agency
asynchronous transmission
3. A comparison metric for different biometric devices and technologies; the point at which the false acceptance rate (FAR) equals the
packet
Fiber Distributed Data Interface (FDDI)
Crossover Error Rate (CER)
NT LAN Manager (NTLM)
4. An Internet routing protocol used to exchange routing information within an autonomous system.
Internal access to the network
hybrid attack
Interior Gateway Protocol (IGP)
security breach or security incident
5. The process of transforming ciphertext into plaintext through the use of a cryptographic algorithm.
CAM table
NT LAN Manager (NTLM)
Decryption
A R
6. A unique numerical string - created by a hashing algorithm on a given piece of data - used to verify data integrity. Generally hashes are used to verify the integrity of files after download (comparison to the hash value on the site before download)
logic bomb
hash
security controls
Authentication Header (AH)
7. A computer network confined to a relatively small area - such as a single building or campus - in which devices connect through high-frequency radio waves using IEEE standard 802.11.
Wireless Local Area Network (WLAN)
Defense in Depth
reverse lookup; reverse DNS lookup
Filter
8. A method for detecting malicious code on a computer where the files are compared to signatures of known viruses stored in a database.
Acceptable Use Policy (AUP)
signature scanning
GET
Data Link layer
9. A computer system that performs tasks dictated by an attacker from a remote location. Zombies may be active or idle - and owners of the systems generally do not know their systems are compromised.
Discretionary Access Control (DAC)
-oX
Zombie
Hierarchical File System (HFS)
10. Port 22
hardware keystroke logger
SSH
Brute-Force Password Attack
SAM
11. An anonymous connection to an administrative share (IPC$) on a Windows machine. Null sessions allow for enumeration of Windows machines - among other attacks.
null session
Buffer Overflow
Common Internet File System/Server Message Block
session hijacking
12. A systematic process for the assessment of security vulnerabilities.
Eavesdropping
Vulnerability Management
INFOSEC Assessment Methodology (IAM)
parallel scan & 75 sec timeout & 0.3 sec/probe
13. An attack where the hacker repeats a portion of a cryptographic exchange in hopes of fooling the system into setting up a communications channel.
replay attack
infrastructure mode
MAC filtering
-sF
14. A penetration test in which the ethical hacker has limited knowledge of the intended target(s). Designed to simulate an internal - but non-systemadministrator-level attack.
Bluejacking
Videocipher II Satellite Encryption System
gray box testing
Time To Live (TTL)
15. Computer software or hardware that can intercept and log traffic passing over a digital network.
node
sniffer
hot site
Domain Name
16. The default network authentication suite of protocols for Windows NT 4.0
NT LAN Manager (NTLM)
Hierarchical File System (HFS)
suicide hacker
Due Care
17. A standard for encrypting e-mail - web pages - and other stream-oriented information transmitted over the Internet.
Finding a directory listing and gaining access to a parent or root file for access to other files
serialize scans & 0.4 sec wait
Address Resolution Protocol (ARP)
Transport Layer Security (TLS)
18. A record showing which user has accessed a given resource and what operations the user performed during a given period.
Redundant Array of Independent Disks (RAID)
personal identification number (PIN)
Real application encompassing Trojan
Audit Trail
19. A term trademarked by the Wi-Fi Alliance - used to define a standard for devices to use to connect to a wireless network.
Active Fingerprinting
false rejection rate (FRR)
Wi-Fi
packet
20. Evaluation in which testers attempt to penetrate the network.
John the Ripper - LOphtcrack - Ophtcrack - Cain and Abel
Kerberos
Web Spider
Level III assessment
21. An attacker who breaks into computer systems with malicious intent - without the owner's knowledge or permission.
Black Hat
Extensible Authentication Protocol (EAP)
White Box Testing
A procedure for identifying active hosts on a network.
22. Port 137/138/139
SMB
reverse social engineering
parallel scan
Hierarchical File System (HFS)
23. A file system used by the Mac OS.
Due Diligence
Finding a directory listing and gaining access to a parent or root file for access to other files
Hierarchical File System (HFS)
Information Technology (IT) infrastructure
24. Shifting responsibility from one party to another
risk transference
reverse social engineering
802.11
Tiger Team
25. Nmap ml output
War Dialing
Brute-Force Password Attack
site survey
-oX
26. A free - open source version of the Berkeley Software Distribution of Unix - often used in embedded systems.
heuristic scanning
Bug
NetBSD
Event
27. Hex 10
Distributed DoS (DDoS)
Unicode
infrastructure mode
A
28. nmap all output
-oA
802.11
Internet Control Message Protocol (ICMP)
ping sweep
29. One or more locations from which control is exercised over a computer - television broadcast - or telecommunications network.
network operations center (NOC)
Challenge Handshake Authentication Protocol (CHAP)
Telnet
Computer-Based Attack
30. An environmentally conditioned workspace partially equipped with IT and telecommunications equipment to support relocated IT operations in the event of a significant disruption.
Cloning
Warm Site
Database
forwarding
31. An Application layer protocol used primarily by Microsoft Windows to provide shared access to printers - files - and serial ports. It also provides an authenticated interprocess communication mechanism.
Anonymizer
packet filtering
asynchronous transmission
Common Internet File System/Server Message Block
32. Wrapper or Binder
Multipartite virus
Hierarchical File System (HFS)
Real application encompassing Trojan
Lightweight Directory Access Protocol (LDAP)
33. RPC Scan
Collision
-sR
Network Address Translation (NAT)
International Organization for Standardization (ISO)
34. Calculations of two components of risk: R - the magnitude of the potential loss (L) - and the probability - p - that the loss will occur.
quantitative risk assessment
self encrypting
symmetric algorithm
Wired Equivalent Privacy (WEP)
35. Software used to bind a Trojan and a legitimate program together so the Trojan will be installed when the legitimate program is executed.
ping sweep
Wrapper
Challenge Handshake Authentication Protocol (CHAP)
Three-Way (TCP) Handshake
36. A condition that occurs when more data is written to a buffer than it has space to store - and results in data corruption or other system errors. This is usually due to insufficient bounds checking - a bug - or improper configuration in the program c
Buffer Overflow
Time Bomb
enumeration
Secure Multipurpose Mail Extension (S/MIME)
37. A symmetric key cipher where plaintext bits are combined with a pseudo-random cipher bit stream (keystream) - typically by an exclusive-or (XOR) operation. In a stream cipher the plaintext digits are encrypted one at a time - and the transformation o
stream cipher
NT LAN Manager (NTLM)
gray box testing
Confidentiality
38. The security property that data is not modified in an unauthorized and undetected manner. Also - the principle and measures taken to ensure that data received is in the exact same condition and state as when it was originally transmitted.
integrity
Simple Network Management Protocol (SNMP)
A procedure for identifying active hosts on a network.
Asynchronous
39. Whether purposeful or the result of malware or other attack - a backdoor is a hidden capability in a system or program for bypassing normal computer authentication systems.
Post Office Protocol 3 (POP3)
service level agreements (SLAs)
security bulletins
Backdoor
40. A protocol that uses a private key to encrypt data before transmitting confidential documents over the Internet; widely used on e-commerce - banking - and other sites requiring privacy.
Secure Sockets Layer (SSL)
Electronic Code Book (ECB)
Crossover Error Rate (CER)
secure channel
41. A technology where you advertise one IP address externally and data packets are rerouted to the appropriate IP address inside your network by a device providing translation services. In this way - IP addresses of machines on your internal network are
Hacks without permission
red team
Network Address Translation (NAT)
hot site
42. The cyclical practice of identifying - classifying - remediating - and mitigating vulnerabilities.
Vulnerability Management
hybrid attack
Asymmetric Algorithm
key exchange protocol
43. The process of pinging each address within a subnet to map potential targets. Ping sweeps are unreliable and easily detectable - but very fast.
risk
intrusion detection system (IDS)
-b
ping sweep
44. A utility that sends an ICMP Echo message to determine if a specific IP address is accessible; if the message receives a reply - the address is reachable.
-sX
Packet Internet Groper (ping)
Tunnel
network interface card (NIC)
45. Port 110
Time exceeded
hacktivism
Certificate Authority (CA)
POP 3
46. ex 02
out-of-band signaling
source routing
S
Interior Gateway Protocol (IGP)
47. The process of using easily accessible DNS records to map a target network's internal hosts.
GET
Ciphertext
DNS enumeration
Archive
48. A system used by the Securities and Exchange Commission (SEC) for companies and businesses to transmit required filings and information. The EDGAR database performs automated collection - validation - indexing - acceptance - and forwarding of submiss
Covert Channel
parallel scan
EDGAR database
HTTP tunneling
49. Controls internal to a system designed to resolve vulnerabilities and errors soon after they arise.
Corrective Controls
Hypertext Transfer Protocol Secure (HTTPS)
Interior Gateway Protocol (IGP)
router
50. The change or growth of a project's scope
Hierarchical File System (HFS)
EDGAR database
scope creep
Domain Name System (DNS) lookup
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests