SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Nmap ml output
-oX
Eavesdropping
Anonymizer
physical security
2. An enumeration technique used to provide information about a computer system; generally used for operating system identification (also known as fingerprinting).
Macro virus
packet filtering
Banner Grabbing
heuristic scanning
3. A step-by-step method of solving a problem. In computing security - an algorithm is a set of mathematical rules (logic) for the process of encryption and decryption
Algorithm
Time To Live (TTL)
Transport Layer Security (TLS)
-sF
4. A system used by the Securities and Exchange Commission (SEC) for companies and businesses to transmit required filings and information. The EDGAR database performs automated collection - validation - indexing - acceptance - and forwarding of submiss
Ethernet
SSH
EDGAR database
protocol
5. The ability to trace actions performed on a system to a specific user or system entity.
Cryptography
Ciphertext
Active Directory (AD)
Accountability
6. A term representing the responsibility managers and their organizations have to provide information security to ensure the type of control - the cost of control - and the deployment of control are appropriate for the system being managed.
social engineering
Due Care
Baseline
Routing Information Protocol (RIP)
7. A method of password cracking whereby all possible options are systematically enumerated until a match is found. These attacks try every password (or authentication option) - one after another - until successful. Bruteforce attacks take a long time t
Bluesnarfing
Bug
Brute-Force Password Attack
-sU
8. Sending packets or requests to another system to gain information to be used to identify weaknesses and protect the system from attacks.
Bit Flipping
Vulnerability Scanning
Biometrics
smart card
9. A distance-vector routing protocol that employs the hop count as a routing metric. The 'hold down time -' used to define how long a route is held in memory - is 180 seconds. RIP prevents routing loops by implementing a limit on the number of hops all
role-based access control
quality of service (QoS)
Routing Information Protocol (RIP)
Bit Flipping
10. Directory Transversal
risk transference
Audit Trail
node
Finding a directory listing and gaining access to a parent or root file for access to other files
11. In penetration testing - enumeration is the act of querying a device or network segment thoroughly and systematically for information.
Data Link layer
enumeration
gray box testing
network access server
12. The secret portion of an asymmetric key pair typically used to decrypt or digitally sign data. The private key is never shared and is always used for decryption - with one notable exception: The private key is used to encrypt the digital signature.
A R
private key
payload
port scanning
13. A software program for remotely controlling a Microsoft Windows computer system over a network. Generally considered malware.
Post Office Protocol 3 (POP3)
NetBus
quality of service (QoS)
quantitative risk assessment
14. An anonymous connection to an administrative share (IPC$) on a Windows machine. Null sessions allow for enumeration of Windows machines - among other attacks.
footprinting
null session
Internet Assigned Number Authority (IANA)
Replacing numbers in a url to access other files
15. A data encryption/decryption program often used for e-mail and file storage.
Blowfish
Methodology
Internet service provider (ISP)
Pretty Good Privacy (PGP)
16. A type of malware that covertly collects information about a user.
spyware
GET
router
inference attack
17. Provides data encryption for IEEE 802.11 wireless networks so data can only be decrypted by the intended recipients.
logic bomb
Wi-Fi Protected Access (WPA)
Cloning
separation of duties
18. Physical socket provided on routers and switches for cable connections between a computer and the router/switch. This connection enables the computer to configure - query - and troubleshoot the router/switch by use of a terminal emulator and a comman
POP 3
Address Resolution Protocol (ARP) table
Console Port
Network Basic Input/Output System (NetBIOS)
19. The steps taken to gather evidence and information on the targets you wish to attack.
Open System Interconnection (OSI) Reference Model
reconnaissance
Authentication - Authorization - and Accounting (AAA)
Simple Mail Transfer Protocol (SMTP)
20. RPC Scan
NT LAN Manager (NTLM)
Bastion host
-sR
role-based access control
21. A nonroutable IP address range intended for use only within the confines of a single organization - falling within the predefined ranges of 10.0.0.0 - 172.16-31.0.0 - or 192.168.0.0.
piggybacking
Due Diligence
keylogger
private network address
22. Formal description and evaluation of the vulnerabilities in an information system
CIA triangle
Distributed DoS (DDoS)
Vulnerability Assessment
port scanning
23. A wireless access point that has either been installed on a secure company network without explicit authorization from a local network administrator - or has been created to allow a hacker to conduct a man-in-the-middle attack.
NT LAN Manager (NTLM)
spam
rogue access point
SSH
24. A structured set of criteria for evaluating computer security within products and systems produced by European countries; it has been largely replaced by the Common Criteria.
Sign in Seal
-PP
Anonymizer
Information Technology Security Evaluation Criteria (ITSEC)
25. A skilled hacker that straddles the line between white hat (hacking only with permission and within guidelines) and black hat (malicious hacking for personal gain). Gray hats sometime perform illegal acts to exploit technology with the intent of achi
gray hat
social engineering
SSH
DNS enumeration
26. A social-engineering attack using computer resources - such as e-mail or IRC.
Digital Watermarking
Reconnaissance - Scanning - Gaining Access - Maintaining Access - Covering Tracks
Internal access to the network
Computer-Based Attack
27. Using conversation or some other interaction between people to gather useful information.
spoofing
human-based social engineering
Level I assessment
Bit Flipping
28. Version Detection Scan
-sV
Domain Name System (DNS) lookup
Malware
Active Attack
29. Port 135
public key infrastructure (PKI)
Internet Assigned Number Authority (IANA)
Acceptable Use Policy (AUP)
RPC-DCOM
30. The transmission of digital signals without precise clocking or synchronization.
piggybacking
Media Access Control (MAC)
key exchange protocol
asynchronous transmission
31. An attack against an authentication protocol in which the attacker intercepts data in transit along the network between the claimant and verifier - but does not alter the data (in other words - eavesdropping).
private key
Interior Gateway Protocol (IGP)
Institute of Electrical and Electronics Engineers (IEEE)
passive attack
32. Software used to bind a Trojan and a legitimate program together so the Trojan will be installed when the legitimate program is executed.
Echo Reply
Macro virus
suicide hacker
Wrapper
33. Occurs when authorized users accumulate excess privileges on a system due to moving from position to position.
Kerberos
Extensible Authentication Protocol (EAP)
Access Creep
Directory Traversal
34. A suite of protocols used for securing Internet Protocol (IP) communications by authenticating and encrypting each IP packet of a communication session. This suite includes protocols for establishing mutual authentication between agents at the sessio
Countermeasures
XOR Operation
Internet Protocol Security (IPSec) architecture
SSH
35. NSA
National Security Agency
Biometrics
signature scanning
CAM table
36. An attack that exploits the common mistake many people make when installing operating systems
operating system attack
protocol
Auditing
File Allocation Table (FAT)
37. Devices - connected to one or more switches - grouped logically into a single broadcast domain. VLANs enable administrators to divide the devices connected to the switches into multiple VLANs without requiring separate physical switches.
Virtual Local Area Network (VLAN)
Authentication - Authorization - and Accounting (AAA)
Fraud and related activity in connection with computers
ping sweep
38. Also known as a digital certificate - this is an electronic file used to verify a user's identity - providing non-repudiation throughout the system It is also a set of data that uniquely identifies an entity. Certificates contain the entity's public
gap analysis
infrastructure mode
Point-to-Point Tunneling Protocol (PPTP)
Certificate
39. An attack in which the hacker can derive information from the ciphertext without actually decoding it. Sensitive information can be considered compromised if an adversary can infer its real value with a high level of confidence.
Local Administrator
inference attack
pattern matching
keylogger
40. The public portion of an asymmetric key pair typically used to encrypt data or verify signatures. Public keys are shared and are used to encrypt messages.
User Datagram Protocol (UDP)
reconnaissance
public key
Eavesdropping
41. An attack with the goal of preventing authorized users from accessing services and preventing the normal operation of computers and networks.
quantitative risk assessment
Denial of Service (DoS)
Telnet
Sign in Seal
42. A sublayer of layer 2 of the OSI model - the Data Link layer. It provides addressing and channel access control mechanisms that enable several terminals or network nodes to communicate within a multipoint network.
Media Access Control (MAC)
Worm
Active Directory (AD)
Time Bomb
43. Black hat
-PI
Hacks without permission
Ciphertext
parallel scan & 75 sec timeout & 0.3 sec/probe
44. A technology where you advertise one IP address externally and data packets are rerouted to the appropriate IP address inside your network by a device providing translation services. In this way - IP addresses of machines on your internal network are
Baseline
Time Bomb
Network Address Translation (NAT)
Videocipher II Satellite Encryption System
45. A cryptographic attack where bits are manipulated in the ciphertext itself to generate a predictable outcome in the plaintext once it is decrypted.
Cryptographic Key
parameter tampering
Bit Flipping
Rijndael
46. LAN standard - defined by ANSI X3T9.5 - specifying a 100Mbps token-passing network using fiber-optic cable and a dualring architecture for redundancy - with transmission distances of up to two kilometers.
Virtual Local Area Network (VLAN)
Fiber Distributed Data Interface (FDDI)
LDAP
Authorization
47. A symmetric key cipher where plaintext bits are combined with a pseudo-random cipher bit stream (keystream) - typically by an exclusive-or (XOR) operation. In a stream cipher the plaintext digits are encrypted one at a time - and the transformation o
stream cipher
Hacks without permission
key exchange protocol
Extensible Authentication Protocol (EAP)
48. Wrapper or Binder
Hypertext Transfer Protocol Secure (HTTPS)
Real application encompassing Trojan
Black Box Testing
packet filtering
49. The potential for damage to or loss of an IT asset
Biometrics
Information Technology (IT) security architecture and framework
spam
risk
50. A denial-of-service technique that uses numerous hosts to perform the attack.
parallel scan
Distributed DoS (DDoS)
-PM
fully qualified domain name (FQDN)