SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A file system used by the Mac OS.
site survey
Dumpster Diving
Hierarchical File System (HFS)
ad hoc mode
2. ICMP Type/Code 3
Destination Unreachable
security defect
POST
parallel scan
3. Malicious code that uses a polymorphic engine to mutate while keeping the original algorithm intact; the code changes itself each time it runs - but the function of the code will not change.
reconnaissance
polymorphic virus
Zenmap
No previous knowledge of the network
4. ICMP Type/Code 8
segment
RxBoot
Echo request
session hijacking
5. An Application layer protocol used primarily by Microsoft Windows to provide shared access to printers - files - and serial ports. It also provides an authenticated interprocess communication mechanism.
HIDS
Common Internet File System/Server Message Block
Last In First Out (LIFO)
Decryption
6. An extensible mechanism for e-mail. A variety of MIME types exist for sending content such as audio - binary - or video using the Simple Mail Transfer Protocol (SMTP).
Multipurpose Internet Mail Extensions (MIME)
security breach or security incident
parallel scan
site survey
7. The secret portion of an asymmetric key pair typically used to decrypt or digitally sign data. The private key is never shared and is always used for decryption - with one notable exception: The private key is used to encrypt the digital signature.
private key
-sW
Mandatory access control (MAC)
Client
8. White hat
Corrective Controls
Level III assessment
Hacks with permission
Blowfish
9. A record showing which user has accessed a given resource and what operations the user performed during a given period.
Audit Trail
War Chalking
--randomize_hosts -O OS fingerprinting
Wireless Local Area Network (WLAN)
10. Port 135
TACACS
RPC-DCOM
public key infrastructure (PKI)
Port Address Translation (PAT)
11. Controlling access to a network by analyzing the headers of incoming and outgoing packets - and letting them pass or discarding them based on rule sets created by a network administrator. A packet filter allows or denies packets based on destination
Countermeasures
packet filtering
Crossover Error Rate (CER)
operating system attack
12. A type of encryption where the same key is used to encrypt and decrypt the message.
Zone transfer
hacktivism
symmetric encryption
network operations center (NOC)
13. A piece of code intentionally inserted into a software system that will perform a malicious function when specified conditions are met at some future point.
ISO 17799
Virtual Local Area Network (VLAN)
Tunneling Virus
logic bomb
14. The transmission of digital signals without precise clocking or synchronization.
asynchronous transmission
honeypot
-oA
Cloning
15. Hex 14
A R
Demilitarized Zone (DMZ)
War Dialing
Copyright
16. FIN Scan
Information Technology Security Evaluation Criteria (ITSEC)
risk acceptance
-sF
Routing Information Protocol (RIP)
17. A background process found in Unix - Linux - Solaris - and other Unix-based operating systems.
FreeBSD
Three-Way (TCP) Handshake
Daemon
Certificate
18. In penetration testing - this is a method of testing the security of a system or subnet without any previous knowledge of the device or network. Designed to simulate an attack by an outside intruder (usually from the Internet).
Black Box Testing
non-repudiation
reconnaissance
Zombie
19. A program designed to browse websites in an automated - methodical manner. Sometimes these programs are used to harvest information from websites - such as e-mail addresses.
White Box Testing
Web Spider
Computer Emergency Response Team (CERT)
Echo Reply
20. An attack where the hacker positions himself between the client and the server - to intercept (and sometimes alter) data traveling between the two.
port knocking
404EE
Assessment
Man-in-the-middle attack
21. A communications path - such as the Internet - authorized for data transmission within a computer system or network.
single loss expectancy (SLE)
route
overt channel
Virus Hoax
22. A Unix-like computer operating system descending from the BSD. Open-BSD includes a number of security features absent or optional in other operating systems.
Droppers
OpenBSD
qualitative analysis
Virus
23. Evaluation in which testers attempt to penetrate the network.
Level III assessment
hash
Point-to-Point Protocol (PPP)
rogue access point
24. A network architecture framework developed by ISO that describes the communications process between two systems across the Internet in seven distinct layers.
Hypertext Transfer Protocol (HTTP)
Denial of Service (DoS)
Open System Interconnection (OSI) Reference Model
node
25. A method in cryptography by which cryptographic keys are exchanged between users - allowing use of a cryptographic algorithm (for example - the Diffie-Hellman key exchange).
key exchange protocol
private network address
SMB
-oX
26. An Application layer protocol for managing devices on an IP network.
intranet
Routing Information Protocol (RIP)
War Chalking
Simple Network Management Protocol (SNMP)
27. Name given to expert groups that handle computer security incidents.
Computer Emergency Response Team (CERT)
router
passive attack
Wrapper
28. List Scan
limitation of liability and remedies
suicide hacker
-sL
-sF
29. A mode of operation for a block cipher - with the characteristic that each possible block of plaintext has a defined corresponding ciphertext value - and vice versa
Electronic Code Book (ECB)
overt channel
SOA record
script kiddie
30. ICMP Ping
-PI
Network Basic Input/Output System (NetBIOS)
nslookup
Dumpster Diving
31. An Internet Protocol Security (IPSec) header used to verify that the contents of a packet have not been modified while the packet was in transit.
audit
Wi-Fi
Authentication Header (AH)
Presentation layer
32. An attack against an authentication protocol in which the attacker intercepts data in transit along the network between the claimant and verifier - but does not alter the data (in other words - eavesdropping).
Authentication Header (AH)
passive attack
sidejacking
self encrypting
33. nmap
-p <port ranges>
Man-in-the-middle attack
piggybacking
Wireless Local Area Network (WLAN)
34. A remote control program in which the client runs on a local computer and connects to a remote server on a network. Commands entered locally are executed on the remote system.
Telnet
Droppers
Information Technology (IT) infrastructure
spam
35. A group of people - gathered together by a business entity - working to address a specific problem or goal.
Tiger Team
Dumpster Diving
human-based social engineering
Archive
36. ex 02
sniffer
Service Set Identifier (SSID)
Bastion host
S
37. The change or growth of a project's scope
scope creep
integrity
Videocipher II Satellite Encryption System
Block Cipher
38. The monetary value assigned to an IT asset.
Acknowledgment (ACK)
Information Technology (IT) asset valuation
Electronic Code Book (ECB)
Extensible Authentication Protocol (EAP)
39. A suite of protocols used for securing Internet Protocol (IP) communications by authenticating and encrypting each IP packet of a communication session. This suite includes protocols for establishing mutual authentication between agents at the sessio
red team
NT LAN Manager (NTLM)
Transport Layer Security (TLS)
Internet Protocol Security (IPSec) architecture
40. A technology that establishes a tunnel to create a private - dedicated - leased-line network over the Internet. The data is encrypted so it's readable only by the sender and receiver. Companies commonly use VPNs to allow employees to connect securely
-PT
Echo request
Virtual Private Network (VPN)
separation of duties
41. A stand-alone computer - kept off the network - that is used for scanning potentially malicious media or software.
Exposure Factor
-PP
XOR Operation
sheepdip
42. A function that is easy to compute in one direction - yet believed to be difficult to compute in the opposite direction (finding its inverse) without special information - called the 'trapdoor.' Widely used in cryptography.
Tunneling
NOP
-sT
Trapdoor Function
43. TCP connect() scan
NetBus
Certificate Authority (CA)
-sO
-sT
44. A set of rules defined by a system administrator that indicates whether access is allowed or denied to resource objects.
Asynchronous
Interior Gateway Protocol (IGP)
rule-based access control
false negative
45. A defined measure of service within a network system
Confidentiality
null session
quality of service (QoS)
Written Authorization
46. Activities to determine the extent to which a security control is implemented correctly - operating as intended - and producing the desired outcome with respect to meeting the security requirements for the system.
Assessment
protocol
social engineering
security kernel
47. The act of dialing all numbers within an organization to discover open modems.
fully qualified domain name (FQDN)
War Dialing
Wireless Local Area Network (WLAN)
enumeration
48. IP Protocol Scan
-sO
Fraud and related activity in connection with computers
Data Link layer
intranet
49. A distance-vector routing protocol that employs the hop count as a routing metric. The 'hold down time -' used to define how long a route is held in memory - is 180 seconds. RIP prevents routing loops by implementing a limit on the number of hops all
Exploit
Routing Information Protocol (RIP)
-sU
Tumbling
50. An attack that exploits the common mistake many people make when installing operating systems
Written Authorization
Simple Object Access Protocol (SOAP)
operating system attack
Post Office Protocol 3 (POP3)