SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A device set up to send a response on behalf of an end node to the requesting host. Proxies are generally used to obfuscate the host from the Internet.
OpenBSD
proxy server
Collision Domain
-sT
2. Self-contained network with a limited number of participants who extend limited trust to one another in order to accomplish an agreed-upon goal.
Community String
Exposure Factor
intranet
Address Resolution Protocol (ARP) table
3. A step-by-step method of solving a problem. In computing security - an algorithm is a set of mathematical rules (logic) for the process of encryption and decryption
Information Technology (IT) asset criticality
Algorithm
Minimum acceptable level of risk
encapsulation
4. Hex 10
port scanning
Possession of access devices
A
-sX
5. Phases of an attack
Reconnaissance - Scanning - Gaining Access - Maintaining Access - Covering Tracks
-oA
operating system attack
SYN attack
6. Physical socket provided on routers and switches for cable connections between a computer and the router/switch. This connection enables the computer to configure - query - and troubleshoot the router/switch by use of a terminal emulator and a comman
router
U P F
Active Fingerprinting
Console Port
7. A point of reference used to mark an initial state in order to manage change.
Baseline
Rijndael
signature scanning
intranet
8. A technology where you advertise one IP address externally and data packets are rerouted to the appropriate IP address inside your network by a device providing translation services. In this way - IP addresses of machines on your internal network are
Network Address Translation (NAT)
--randomize_hosts -O OS fingerprinting
Bluejacking
network tap
9. A computer network confined to a relatively small area - such as a single building or campus.
Temporal Key Integrity Protocol (TKIP)
-PS
local area network (LAN)
-p <port ranges>
10. A widely used authentication protocol developed at the MassachusettsInstitute of Technology (MIT). Kerberos authentication uses tickets - Ticket Granting Service - and Key Distribution Center.
Kerberos
gateway
impersonation
security breach or security incident
11. A symmetric key cryptographic algorithm that transforms a block of information at a time using a cryptographic key. For a block cipher algorithm - the length of the input block is the same as the length of the output block.
Block Cipher
Interior Gateway Protocol (IGP)
False Acceptance Rate (FAR)
script kiddie
12. A security tool designed to protect a system or network against attacks by comparing traffic patterns against a list of both known attack signatures and general characteristics of how attacks may be carried out. Threats are rated and reported.
Corrective Controls
Worm
intrusion detection system (IDS)
Acknowledgment (ACK)
13. The set of all hardware - firmware - and/or software components critical to IT security. Bugs or vulnerabilities occurring inside the TCB might jeopardize the security properties of the entire system.
packet
spoofing
Trusted Computer Base (TCB)
Videocipher II Satellite Encryption System
14. A VPN tunneling protocol with encryption. PPTP connects two nodes in a VPN by using one TCP port for negotiation and authentication and one IP protocol for data transfer.
A series of messages sent by someone attempting to break into a computer to learn about the computer's network services.
honeypot
Point-to-Point Tunneling Protocol (PPTP)
R
15. Layer 2 of the OSI reference model. This layer provides reliable transit of data across a physical link. The Data Link layer is concerned with physical addressing - network topology - access to the network medium - error detection - sequential delive
quantitative risk assessment
Data Link layer
honeypot
Port Address Translation (PAT)
16. A hacker who aims to bring down critical infrastructure for a 'cause' and does not worry about the penalties associated with his actions.
Authentication Header (AH)
Zero Subnet
suicide hacker
Collision
17. Chronological record of system activities to enable the reconstruction and examination of the sequence of events and changes in an event.
Audit Data
Defines legal email marketing
Interior Gateway Protocol (IGP)
Point-to-Point Protocol (PPP)
18. Sneaky scan timing
Active Directory (AD)
serialize scans & 15 sec wait
Bluesnarfing
Discretionary Access Control (DAC)
19. The exploitation of a security vulnerability
File Allocation Table (FAT)
security breach or security incident
Vulnerability
Confidentiality
20. A protocol for exchanging packets over a serial line.
Serial Line Internet Protocol (SLIP)
stateful packet filtering
Real application encompassing Trojan
Extensible Authentication Protocol (EAP)
21. A unique hostname that is used to identify resources on the Internet. Domain names start with a root (.) - then add a top level (.com - .gov - or .mil - for example) - and a given name space.
Open System Interconnection (OSI) Reference Model
Three-Way (TCP) Handshake
Domain Name
Simple Network Management Protocol (SNMP)
22. Host-based IDS. An IDS that resides on the host - protecting against file and folder manipulation and other host-based attacks and actions.
FTP
HIDS
Three-Way (TCP) Handshake
Reconnaissance - Scanning - Gaining Access - Maintaining Access - Covering Tracks
23. Window Scan
-sW
risk avoidance
gray hat
Threat
24. A pen testing method where the attacker knows all information about the internal network. It is designed to simulate an attack by a disgruntled systems administrator - or similar level.
White Box Testing
gray box testing
pattern matching
The automated process of proactively identifying vulnerabilities of computing systems present in a network
25. In penetration testing - enumeration is the act of querying a device or network segment thoroughly and systematically for information.
Application Layer
Baseline
enumeration
intranet
26. An inspection of a place where a company or individual proposes to work - to gather the necessary information for a design or risk assessment.
Malicious code
site survey
National Security Agency
spoofing
27. A derogatory term used to describe an attacker - usually new to the field - who uses simple - easy-to-follow scripts or programs developed by others to attack computer systems and networks and deface websites.
script kiddie
Assessment
pattern matching
Pretty Good Privacy (PGP)
28. A cell phone attack in which the serial number from one cell phone is copied to another in an effort to copy the cell phone.
Transport Layer Security (TLS)
Cloning
Authentication - Authorization - and Accounting (AAA)
null session
29. An e-mail message warning users of a nonexistent virus and encouraging them to pass on the message to other users.
A R
Contingency Plan
Event
Virus Hoax
30. A virus written in a macro language and usually embedded in document or spreadsheet files.
Macro virus
ISO 17799
DNS
-sP
31. A skilled hacker that straddles the line between white hat (hacking only with permission and within guidelines) and black hat (malicious hacking for personal gain). Gray hats sometime perform illegal acts to exploit technology with the intent of achi
gray hat
Videocipher II Satellite Encryption System
parallel scan & 300 sec timeout & 1.25 sec/probe
Information Technology Security Evaluation Criteria (ITSEC)
32. The lack of clocking (imposed time ordering) on a bit stream.
Presentation layer
Asynchronous
risk avoidance
security kernel
33. A record showing which user has accessed a given resource and what operations the user performed during a given period.
Event
Audit Trail
-sL
Daemon
34. A physical security attack where the attacker sifts through garbage and recycle bins for information that may be useful on current and future attacks
Vulnerability Scanning
Bit Flipping
Dumpster Diving
Institute of Electrical and Electronics Engineers (IEEE)
35. A virus that plants itself in a system's boot sector and infects the master boot record.
Annualized Loss Expectancy (ALE)
session splicing
A
Boot Sector Virus
36. A command used in HTTP and FTP to retrieve a file from a server.
Defines legal email marketing
GET
Time exceeded
Active Fingerprinting
37. Directory Transversal
Finding a directory listing and gaining access to a parent or root file for access to other files
promiscuous mode
key exchange protocol
penetration testing
38. Any circumstance or event with the potential to adversely impact organizationaloperations - organizational assets - or individuals through an information system via unauthorized access - destruction - disclosure - modification of information - and/or
halo effect
Threat
hot site
Transmission Control Protocol (TCP)
39. An Ethernet networking system transmitting data at 100 million bits per second (Mbps) - 10 times the speed of an earlier Ethernet standard. Derived from the Ethernet 802.3 standard - it is also known as 100BaseT.
Fast Ethernet
encapsulation
-sT
Google hacking
40. Black box test
No previous knowledge of the network
International Organization for Standardization (ISO)
Bluejacking
Wired Equivalent Privacy (WEP)
41. The act of dialing all numbers within an organization to discover open modems.
Multipurpose Internet Mail Extensions (MIME)
Directory Traversal
Boot Sector Virus
War Dialing
42. Another term for firewalking
port knocking
Time To Live (TTL)
intrusion prevention system (IPS)
Virus Hoax
43. A legal limit on the amount of financial liability and remedies the organization is responsible for taking on.
Multipurpose Internet Mail Extensions (MIME)
social engineering
segment
limitation of liability and remedies
44. Content Addressable Memory table. Holds all the MAC-address-to-port mappings on a switch.
Defense in Depth
CAM table
Unicode
Asymmetric Algorithm
45. Actions - devices - procedures - techniques - or other measures intended to reduce the vulnerability of an information system.
802.11 i
Internet Protocol Security (IPSec) architecture
Exposure Factor
Countermeasures
46. A three-step process computers execute to negotiate a connection with one another. The three steps are SYN - SYN/ACK - ACK.
Three-Way (TCP) Handshake
sidejacking
-sS
gateway
47. The process of pinging each address within a subnet to map potential targets. Ping sweeps are unreliable and easily detectable - but very fast.
Self Replicating
ping sweep
Minimum acceptable level of risk
Client
48. Controls internal to a system designed to resolve vulnerabilities and errors soon after they arise.
single loss expectancy (SLE)
Corrective Controls
firewall
-sR
49. LAN standard - defined by ANSI X3T9.5 - specifying a 100Mbps token-passing network using fiber-optic cable and a dualring architecture for redundancy - with transmission distances of up to two kilometers.
passive attack
remote access
honeynet
Fiber Distributed Data Interface (FDDI)
50. An international organization composed of national standards bodies from over 75 countries. Developed the OSI reference model.
Domain Name
International Organization for Standardization (ISO)
asynchronous transmission
Community String