SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A section or subset of the network. Often a router or other routing device provides the end point of the segment.
Warm Site
segment
enumeration
reverse social engineering
2. PI and PT Ping
Mantrap
Cryptographic Key
-PB
--randomize_hosts -O OS fingerprinting
3. A method of falsely identifying the source of data packets; often used by hackers to make it difficult to trace where an attack originated.
Cryptographic Key
spoofing
Last In First Out (LIFO)
Master boot record infector
4. Actions - devices - procedures - techniques - or other measures intended to reduce the vulnerability of an information system.
enumeration
-sP
Serial Line Internet Protocol (SLIP)
Countermeasures
5. Port 22
Zombie
SSH
net use \[target ip]IPC$ '' /user:''
R
6. An announcement - typically from a software vendor - of a known security vulnerability in a program; often the bulletin contains instructions for the application of a software patch.
Finger
security bulletins
honeypot
-oX
7. A systematic process for the assessment of security vulnerabilities.
Tumbling
Reconnaissance - Scanning - Gaining Access - Maintaining Access - Covering Tracks
INFOSEC Assessment Methodology (IAM)
Wired Equivalent Privacy (WEP)
8. A means of restricting access to system resources based on the sensitivity (as represented by a label) of the information contained in the system resource and the formal authorization (that is - clearance) of users to access information of such sensi
Interior Gateway Protocol (IGP)
Mandatory access control (MAC)
Exposure Factor
-sX
9. A partially protected zone on a network - not exposed to the full fury of the Internet - but not fully behind the firewall. This technique is typically used on parts of the network that must remain open to the public (such as a web server) but must a
Finger
A R
Zombie
Demilitarized Zone (DMZ)
10. An early network application that provides information on users currently logged on to a machine.
polymorphic virus
stream cipher
Network Basic Input/Output System (NetBIOS)
Finger
11. ICMP Type/Code 0-0
Daemon
Threat
Worm
Echo Reply
12. A networking configuration where all nodes are connected in a circle with no terminated ends on the cable.
Virtual Local Area Network (VLAN)
ring topology
Console Port
key exchange protocol
13. Ping Scan
Asset
packet
Algorithm
-sP
14. A Windows-based GUI version of nmap.
remote procedure call (RPC)
Zenmap
Directory Traversal
Bluesnarfing
15. The rate at which a biometric system will incorrectly reject an access attempt by an authorized user.
secure channel
National Security Agency
false rejection rate (FRR)
Detective Controls
16. The result of using a private key to encrypt a hash value for identification purposes within a PKI system. The signature can be decoded by the originator's public key - verifying his identity and providing non-repudiation. A valid digital signature g
nslookup
Digital Signature
Asset
hot site
17. Controls internal to a system designed to resolve vulnerabilities and errors soon after they arise.
parallel scan & 75 sec timeout & 0.3 sec/probe
Routing Information Protocol (RIP)
Corrective Controls
Tiger Team
18. A self-replicating - self-propagating - self-contained program that uses networking mechanisms to spread itself.
Discretionary Access Control (DAC)
Fiber Distributed Data Interface (FDDI)
impersonation
Worm
19. A background process found in Unix - Linux - Solaris - and other Unix-based operating systems.
Daemon
Computer Emergency Response Team (CERT)
Bug
Master boot record infector
20. A set of hardware - software - people - policies - and procedures needed to create - manage - distribute - use - store - and revoke digital certificates.
Address Resolution Protocol (ARP)
-sO
risk avoidance
public key infrastructure (PKI)
21. An organized collection of data.
Virtual Local Area Network (VLAN)
smart card
Database
reverse lookup; reverse DNS lookup
22. A protocol for transporting data packets across a packet switched internetwork (such as the Internet). IP is a routed protocol.
Application Layer
Wired Equivalent Privacy (WEP)
Cracker
Internet Protocol (IP)
23. The process of recording activity on a system for monitoring and later review.
Auditing
CNAME record
smart card
Bastion host
24. A limited-function version of the Internetworking Operating System (IOS) - held in read-only memory in some earlier models of Cisco devices - capable of performing several seldom-needed low-level functions such as loading a new IOS into Flash memory
Bastion host
RxBoot
Simple Mail Transfer Protocol (SMTP)
security defect
25. A means of exchanging information from one entity to another using a process that does not provide an attacker the opportunity to reorder - delete - insert - or read information.
flood
Archive
secure channel
Presentation layer
26. A method of evaluating the security of a computer system or network by simulating an attack from a malicious source.
serialize scans & 15 sec wait
Asynchronous
penetration testing
Algorithm
27. Nmap grepable output
Master boot record infector
-oG
Common Internet File System/Server Message Block
Authentication Header (AH)
28. A backlog of packets stored in buffers and waiting to be forwarded over an interface.
INFOSEC Assessment Methodology (IAM)
queue
Worm
ECHO reply
29. A symmetric key cryptographic algorithm that transforms a block of information at a time using a cryptographic key. For a block cipher algorithm - the length of the input block is the same as the length of the output block.
Fraud and related activity in connection with computers
Block Cipher
rootkit
flood
30. A protocol for exchanging packets over a serial line.
Serial Line Internet Protocol (SLIP)
Real application encompassing Trojan
protocol stack
Daemon
31. A domain composed of all the systems sharing any given physical transport media. Systems within a collision domain may collide with each other during the transmission of data. Collisions can be managed by CSMA/CD (collision detection) or CSMA/CA (col
DNS
Bastion host
Possession of access devices
Collision Domain
32. A sublayer of layer 2 of the OSI model - the Data Link layer. It provides addressing and channel access control mechanisms that enable several terminals or network nodes to communicate within a multipoint network.
Media Access Control (MAC)
INFOSEC Assessment Methodology (IAM)
port redirection
Threat
33. Used for exchanging structured information - such as XML-based messages - in the implementation of web services
Simple Object Access Protocol (SOAP)
Crossover Error Rate (CER)
net use \[target ip]IPC$ '' /user:''
EDGAR database
34. A value assigned to uniquely identify a single wide area network (WAN) in wireless LANs. SSIDs are broadcast by default - and are sent in the header of every packet. SSIDs provide no encryption or security.
HIDS
Tunneling Virus
Service Set Identifier (SSID)
spam
35. The process of determining if a network entity (user or service) is legitimate
Routing Protocol
Authentication
Cookie
impersonation
36. FIN Scan
Discretionary Access Control (DAC)
limitation of liability and remedies
Secure Multipurpose Mail Extension (S/MIME)
-sF
37. A free and popular version of the Unix operating system.
--randomize_hosts -O OS fingerprinting
FreeBSD
Videocipher II Satellite Encryption System
Hacks with permission
38. A program or piece of code inserted into a system - usually covertly - with the intent of compromising the confidentiality - integrity - or availability of the victim's data - applications - or operating system. Malware consists of viruses - worms -
Malware
-P0
private network address
Videocipher II Satellite Encryption System
39. A software or hardware defect that often results in system vulnerabilities.
Self Replicating
Interior Gateway Protocol (IGP)
Bug
Virtual Private Network (VPN)
40. A network traffic management technique designed to allow applications to specify the route a packet will take to a destination - regardless of what the route tables between the two systems say.
source routing
-sF
SYN attack
Baseline
41. Malicious code that uses a polymorphic engine to mutate while keeping the original algorithm intact; the code changes itself each time it runs - but the function of the code will not change.
passive attack
protocol stack
Domain Name System (DNS)
polymorphic virus
42. nmap
parallel scan
Reconnaissance - Scanning - Gaining Access - Maintaining Access - Covering Tracks
-p <port ranges>
Buffer
43. An international encoding standard - working within multiple languages and scripts - that represents each letter - digit - or symbol with a unique numeric value that applies across different platforms.
Unicode
Event
Interior Gateway Protocol (IGP)
Demilitarized Zone (DMZ)
44. Hex 10
session splicing
802.11
A
Level II assessment
45. A unique numerical string - created by a hashing algorithm on a given piece of data - used to verify data integrity. Generally hashes are used to verify the integrity of files after download (comparison to the hash value on the site before download)
Smurf attack
protocol stack
port redirection
hash
46. Normal scan timing
Competitive Intelligence
parallel scan
hot site
Defense in Depth
47. A method for detecting malicious code on a computer where the files are compared to signatures of known viruses stored in a database.
signature scanning
Bluesnarfing
limitation of liability and remedies
security breach or security incident
48. A form of fraud in which someone pretends to be someone else by assuming that person's identity - typically in order to access resources or obtain credit and other benefits in that person's name.
Filter
Console Port
risk acceptance
identity theft
49. Computer software or hardware that can intercept and log traffic passing over a digital network.
Internal access to the network
Defines legal email marketing
sniffer
Covert Channel
50. A free - open source version of the Berkeley Software Distribution of Unix - often used in embedded systems.
-b
NetBSD
intrusion prevention system (IPS)
Back orifice