SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Normal scan timing
Hacks without permission
public key
parallel scan
Algorithm
2. A documented process for a procedure designed to be consistent - repeatable - and accountable.
Auditing
symmetric encryption
Syslog
Methodology
3. A standard for encrypting e-mail - web pages - and other stream-oriented information transmitted over the Internet.
Data Encryption Standard (DES)
null session
Transport Layer Security (TLS)
TACACS
4. The process of a system providing a fully qualified domain name (FQDN) to a local name server - for resolution to its corresponding IP address.
Serial Line Internet Protocol (SLIP)
serialize scans & 0.4 sec wait
Domain Name System (DNS) lookup
-oA
5. An extensible mechanism for e-mail. A variety of MIME types exist for sending content such as audio - binary - or video using the Simple Mail Transfer Protocol (SMTP).
Multipurpose Internet Mail Extensions (MIME)
rule-based access control
overt channel
Trojan Horse
6. A standard for encrypting and authenticating MIME data; used primarily for Internet e-mail.
Client
Access Point (AP)
Secure Multipurpose Mail Extension (S/MIME)
Macro virus
7. The science or study of protecting information - whether in transit or at rest - by using techniques to render the information unusable to anyone who does not possess the means to decrypt it.
Cryptography
parallel scan & 75 sec timeout & 0.3 sec/probe
identity theft
Multipartite virus
8. A method of permitting only MAC addresses in a preapproved list network access. Addresses not matching are blocked.
Google hacking
network interface card (NIC)
stateful packet filtering
MAC filtering
9. A mode of operation in a wireless LAN in which clients send data directly to one another without utilizing a wireless access point (WAP) - much like a point-to-point wired connection.
-PT
ad hoc mode
enumeration
secure channel
10. Wrapper or Binder
No previous knowledge of the network
Computer Emergency Response Team (CERT)
Information Technology (IT) security architecture and framework
Real application encompassing Trojan
11. In a classful IPv4 subnet - this is the network number with all binary 0s in the subnet part of the number. When written in decimal - the zero subnet has the same number as the classful network number.
asynchronous transmission
false rejection rate (FRR)
Zero Subnet
Interior Gateway Protocol (IGP)
12. A symmetric key cipher where plaintext bits are combined with a pseudo-random cipher bit stream (keystream) - typically by an exclusive-or (XOR) operation. In a stream cipher the plaintext digits are encrypted one at a time - and the transformation o
stream cipher
Time exceeded
security incident response team (SIRT)
phishing
13. An Application layer protocol for managing devices on an IP network.
Vulnerability Management
-sS
Simple Network Management Protocol (SNMP)
The automated process of proactively identifying vulnerabilities of computing systems present in a network
14. Steps taken to identify and limit risks to an acceptable or reasonable level of exposure.
Black Box Testing
Hacks with permission
Due Diligence
Zero Subnet
15. A utility that sends an ICMP Echo message to determine if a specific IP address is accessible; if the message receives a reply - the address is reachable.
Packet Internet Groper (ping)
role-based access control
RPC-DCOM
Database
16. Security identifier. The method by which Windows identifies user - group - and computer accounts for rights and permissions.
iris scanner
forwarding
SID
Service Set Identifier (SSID)
17. The use of deceptive computer-based means to trick individuals into disclosing sensitive personal information
hardware keystroke logger
phishing
XOR Operation
security kernel
18. An attack where the hacker positions himself between the client and the server - to intercept (and sometimes alter) data traveling between the two.
FTP
HTTP
NetBus
Man-in-the-middle attack
19. White hat
Macro virus
Domain Name System (DNS)
Hacks with permission
encryption
20. An Application layer protocol used primarily by Microsoft Windows to provide shared access to printers - files - and serial ports. It also provides an authenticated interprocess communication mechanism.
User Datagram Protocol (UDP)
Common Internet File System/Server Message Block
Collision Domain
Trusted Computer System Evaluation Criteria (TCSEC)
21. A method of falsely identifying the source of data packets; often used by hackers to make it difficult to trace where an attack originated.
symmetric algorithm
risk acceptance
spoofing
-sT
22. Paranoid scan timing
parallel scan
-sV
Distributed DoS (DDoS)
serial scan & 300 sec wait
23. Start of Authority record. This record identifies the primary name server for the zone. The SOA record contains the host name of the server responsible for all DNS records within the namespace - as well as the basic properties of the domain.
personal identification number (PIN)
SOA record
Biometrics
reverse social engineering
24. A wireless LAN security standard developed by IEEE. Requires Temporal Key Integrity Protocol (TKIP) and Advanced Encryption Standard (AES).
Simple Mail Transfer Protocol (SMTP)
802.11 i
false rejection rate (FRR)
Real application encompassing Trojan
25. Window Scan
Brute-Force Password Attack
-sW
Boot Sector Virus
A series of messages sent by someone attempting to break into a computer to learn about the computer's network services.
26. Malware designed to install some sort of virus - backdoor - and so on - on a target system.
Console Port
LDAP
route
Droppers
27. A mode of operation for a block cipher - with the characteristic that each possible block of plaintext has a defined corresponding ciphertext value - and vice versa
Digital Signature
Electronic Code Book (ECB)
serialize scans & 15 sec wait
Algorithm
28. A piece of code intentionally inserted into a software system that will perform a malicious function when specified conditions are met at some future point.
Man-in-the-middle attack
Tiger Team
logic bomb
router
29. Sending packets or requests to another system to gain information to be used to identify weaknesses and protect the system from attacks.
Traceroute
Vulnerability Scanning
serial scan & 300 sec wait
A S
30. A text file stored within a browser by a web server that maintains information about the connection. Cookies are used to store information to maintain a unique but consistent surfing experience - but can also contain authentication parameters. Cookie
SYN attack
Cookie
penetration testing
Backdoor
31. An organized collection of data.
Database
Authentication - Authorization - and Accounting (AAA)
DNS enumeration
halo effect
32. Port 110
Data Encryption Standard (DES)
POP 3
operating system attack
impersonation
33. Incremental Substitution
Replacing numbers in a url to access other files
Competitive Intelligence
honeypot
Ciphertext
34. Text or data in its encrypted form; the result of plaintext being input into a cryptographic algorithm.
operating system attack
Ciphertext
Tunnel
Computer-Based Attack
35. A computer network confined to a relatively small area - such as a single building or campus.
Hypertext Transfer Protocol (HTTP)
RxBoot
replay attack
local area network (LAN)
36. A set of rules defined to screen network packets based on source address - destination address - or protocol; these rules determine whether the packet will be forwarded or discarded.
false rejection rate (FRR)
INFOSEC Assessment Methodology (IAM)
protocol
Filter
37. Port 23
hacktivism
Wi-Fi Protected Access (WPA)
Telnet
infrastructure mode
38. The process of embedding information into a digital signal in a way that makes it difficult to remove.
A procedure for identifying active hosts on a network.
Digital Watermarking
FreeBSD
The automated process of proactively identifying vulnerabilities of computing systems present in a network
39. Layer 6 of the OSI reference model. The Presentation layer ensures information sent by the Application layer of the sending system will be readable by the Application layer of the receiving system.
security incident response team (SIRT)
Time exceeded
Presentation layer
-sT
40. The process of using easily accessible DNS records to map a target network's internal hosts.
firewalking
A series of messages sent by someone attempting to break into a computer to learn about the computer's network services.
DNS enumeration
Presentation layer
41. A self-replicating - self-propagating - self-contained program that uses networking mechanisms to spread itself.
Routing Information Protocol (RIP)
Vulnerability
Worm
Active Attack
42. Computer software or hardware that can intercept and log traffic passing over a digital network.
Open System Interconnection (OSI) Reference Model
sniffer
-P0
-sS
43. Freely and readily available information on an organization that can be gathered by a business entity about its competitor's customers - products - and marketing - and can be used by an attacker to build useful information for further attacks.
-sV
Trapdoor Function
Competitive Intelligence
inference attack
44. Cracking Tools
Data Encryption Standard (DES)
File Allocation Table (FAT)
Simple Mail Transfer Protocol (SMTP)
John the Ripper - LOphtcrack - Ophtcrack - Cain and Abel
45. A background process found in Unix - Linux - Solaris - and other Unix-based operating systems.
Domain Name System (DNS)
Redundant Array of Independent Disks (RAID)
-PB
Daemon
46. MAC Flooding
Cryptography
Wired Equivalent Privacy (WEP)
Information Technology Security Evaluation Criteria (ITSEC)
Overwhelm CAM table to convert switch to hub mode
47. The set of all hardware - firmware - and/or software components critical to IT security. Bugs or vulnerabilities occurring inside the TCB might jeopardize the security properties of the entire system.
404EE
Zone transfer
International Organization for Standardization (ISO)
Trusted Computer Base (TCB)
48. Access by information systems (or users) communicating from outside the information system security perimeter.
Domain Name System (DNS) cache poisoning
A procedure for identifying active hosts on a network.
remote access
Last In First Out (LIFO)
49. Polite scan timing
infrastructure mode
Back orifice
promiscuous mode
serialize scans & 0.4 sec wait
50. A limit on the amount of time or number of iterations or transmissions in computer and network technology a packet can experience before it will be discarded.
Time To Live (TTL)
Defense in Depth
R
Bug
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests