SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Attacks that take advantage of the built-in code and scripts most off-the-shelf applications come with.
flood
International Organization for Standardization (ISO)
shrink-wrap code attacks
Interior Gateway Protocol (IGP)
2. A symmetric key cryptographic algorithm that transforms a block of information at a time using a cryptographic key. For a block cipher algorithm - the length of the input block is the same as the length of the output block.
security breach or security incident
role-based access control
Information Technology (IT) security architecture and framework
Block Cipher
3. An Internet Protocol Security (IPSec) header used to verify that the contents of a packet have not been modified while the packet was in transit.
Electronic Code Book (ECB)
SNMP
Network Basic Input/Output System (NetBIOS)
Authentication Header (AH)
4. An evaluation consisting of a document review - interviews - and demonstrations. No hands-on testing is performed.
Methodology
Black Hat
Level I assessment
Countermeasures
5. An Internet routing protocol used to exchange routing information within an autonomous system.
Interior Gateway Protocol (IGP)
Post Office Protocol 3 (POP3)
Overwhelm CAM table to convert switch to hub mode
Asynchronous
6. Another term for firewalking
port knocking
Authentication
limitation of liability and remedies
Access Control List (ACL)
7. don't ping
port redirection
payload
Droppers
-P0
8. A unit of information formatted according to specific protocols that allows precise transmittal of data from one network node to another. Also called a datagram or data packet - a packet contains a header (container) and a payload (contents). Any IP
Certificate Authority (CA)
R
packet
A R
9. A method of password cracking whereby all possible options are systematically enumerated until a match is found. These attacks try every password (or authentication option) - one after another - until successful. Bruteforce attacks take a long time t
Brute-Force Password Attack
Anonymizer
Digital Certificate
packet
10. A method for detecting malicious code on a computer where the files are compared to signatures of known viruses stored in a database.
Cryptography
signature scanning
Internal access to the network
Wiretapping
11. A group of experts that handles computer security incidents.
Wrapper
Contingency Plan
security incident response team (SIRT)
smart card
12. A protocol used to pass control and error messages between nodes on the Internet.
Algorithm
Internet Control Message Protocol (ICMP)
Real application encompassing Trojan
Replacing numbers in a url to access other files
13. Version Detection Scan
Baseline
Authentication Header (AH)
Information Technology Security Evaluation Criteria (ITSEC)
-sV
14. Looking over an authorized user's shoulder in order to steal information (such as authentication information).
steganography
protocol stack
Extensible Authentication Protocol (EAP)
shoulder surfing
15. The act of checking some sequence of tokens for the presence of the constituents of some pattern.
Transport Layer Security (TLS)
SSH
pattern matching
Hacks without permission
16. A protocol for transporting data packets across a packet switched internetwork (such as the Internet). IP is a routed protocol.
Ethernet
SAM
Pretty Good Privacy (PGP)
Internet Protocol (IP)
17. An Application layer protocol for managing devices on an IP network.
Simple Network Management Protocol (SNMP)
Virus
SYN flood attack
Level III assessment
18. A standard for encrypting and authenticating MIME data; used primarily for Internet e-mail.
Tini
War Chalking
MD5
Secure Multipurpose Mail Extension (S/MIME)
19. A communications path - such as the Internet - authorized for data transmission within a computer system or network.
Worm
Pretty Good Privacy (PGP)
Corrective Controls
overt channel
20. A VPN tunneling protocol with encryption. PPTP connects two nodes in a VPN by using one TCP port for negotiation and authentication and one IP protocol for data transfer.
Time To Live (TTL)
Hypertext Transfer Protocol (HTTP)
Institute of Electrical and Electronics Engineers (IEEE)
Point-to-Point Tunneling Protocol (PPTP)
21. An environmentally conditioned workspace partially equipped with IT and telecommunications equipment to support relocated IT operations in the event of a significant disruption.
Warm Site
impersonation
Asynchronous
port scanning
22. A security protocol used in IEEE 802.11i to replace WEP without the requirement to replace legacy hardware.
Temporal Key Integrity Protocol (TKIP)
Due Care
secure channel
Wiretapping
23. Malware designed to install some sort of virus - backdoor - and so on - on a target system.
U P F
security kernel
-PI
Droppers
24. Independent review and examination of records and activities to assess the adequacy of system controls - to ensure compliance with established policies and operational procedures - and to recommend necessary changes.
Access Point (AP)
risk assessment
Cold Site
audit
25. A query and response protocol widely used for querying databases that store the registered users or assignees of an Internet resource - such as a domain name - an IP address - or an autonomous system.
SAM
Community String
Whois
Internet Assigned Number Authority (IANA)
26. A security objective that ensures a resource can be accessed only by authorized users. This is also the property that sensitive information is not disclosed to unauthorized individuals - entities - or processes.
Port Address Translation (PAT)
Confidentiality
HTTP tunneling
Trapdoor Function
27. An anonymous connection to an administrative share (IPC$) on a Windows machine. Null sessions allow for enumeration of Windows machines - among other attacks.
null session
rootkit
network access server
Digital Signature
28. A brand name of analog scrambling and de-scrambling equipment for cable and satellite television - invented primarily to keep consumer Television receive-only (TVRO) satellite equipment from receiving TV programming except on a subscription basis.
Videocipher II Satellite Encryption System
rule-based access control
open source
gray box testing
29. A derogatory term used to describe an attacker - usually new to the field - who uses simple - easy-to-follow scripts or programs developed by others to attack computer systems and networks and deface websites.
Digital Signature
rootkit
Exposure Factor
script kiddie
30. A utility that traces a packet from your computer to an Internet host - showing how many hops the packet takes to reach the host and how long the packet requires to complete the hop.
Traceroute
Transmission Control Protocol (TCP)
SID
Virtual Local Area Network (VLAN)
31. A document describing information security guidelines - policies - procedures - and standards.
Traceroute
Information Technology (IT) security architecture and framework
Hypertext Transfer Protocol (HTTP)
Routing Information Protocol (RIP)
32. A technology that establishes a tunnel to create a private - dedicated - leased-line network over the Internet. The data is encrypted so it's readable only by the sender and receiver. Companies commonly use VPNs to allow employees to connect securely
hardware keystroke logger
spyware
Virtual Private Network (VPN)
ECHO reply
33. A software or hardware defect that often results in system vulnerabilities.
parallel scan
-sW
Bug
reconnaissance
34. SYN Ping
-PS
SNMP
Information Technology (IT) infrastructure
Droppers
35. Phases of an attack
Reconnaissance - Scanning - Gaining Access - Maintaining Access - Covering Tracks
packet
false rejection rate (FRR)
gray hat
36. A method of network traffic filtering that monitors the entire communications process - including the originator of the session and from which direction it started.
intrusion prevention system (IPS)
identity theft
-sP
stateful packet filtering
37. A network administration command-line tool available for many operating systems for querying the Domain Name System (DNS) to obtain domain name or IP address mappings or any other specific DNS record.
nslookup
Zombie
Network Address Translation (NAT)
Daemon
38. Also known as a public key certificate - this is an electronic file that is used to verify a user's identity - providing non-repudiation throughout the sys-tem. Certificates contain the entity's public key - serial number - version - subject - algori
rootkit
DNS
Cracker
Digital Certificate
39. The software product or system that is the subject of an evaluation.
EDGAR database
Adware
Target Of Engagement (TOE)
piggybacking
40. Sneaky scan timing
replay attack
quantitative risk assessment
serialize scans & 15 sec wait
Kerberos
41. A cyber attacker who acts without permission from - and gives prior notice to - the resource owner. Also known as a malicious hacker.
rogue access point
Address Resolution Protocol (ARP) table
Man-in-the-middle attack
Cracker
42. A legal limit on the amount of financial liability and remedies the organization is responsible for taking on.
limitation of liability and remedies
Information Technology (IT) asset criticality
Cloning
Whois
43. A command used in HTTP and FTP to retrieve a file from a server.
public key
GET
Black Box Testing
R
44. A non-self-replicating program that appears to have a useful purpose - but in reality has a different - malicious purpose.
Serial Line Internet Protocol (SLIP)
Trusted Computer System Evaluation Criteria (TCSEC)
Multipurpose Internet Mail Extensions (MIME)
Trojan Horse
45. A biometric device that uses pattern-recognition techniques based on images of the irises of an individual's eyes.
Malware
Point-to-Point Tunneling Protocol (PPTP)
Wired Equivalent Privacy (WEP)
iris scanner
46. An attack where the hacker positions himself between the client and the server - to intercept (and sometimes alter) data traveling between the two.
Telnet
Post Office Protocol 3 (POP3)
Man-in-the-middle attack
Crossover Error Rate (CER)
47. A suite of protocols used for securing Internet Protocol (IP) communications by authenticating and encrypting each IP packet of a communication session. This suite includes protocols for establishing mutual authentication between agents at the sessio
public key infrastructure (PKI)
Internet Protocol Security (IPSec) architecture
No previous knowledge of the network
Authorization
48. A hybrid of the HTTP and SSL/TLS protocols that provides encrypted communication and secure identification of a web server.
Console Port
Hypertext Transfer Protocol Secure (HTTPS)
session splicing
Digital Watermarking
49. An early network application that provides information on users currently logged on to a machine.
-P0
Traceroute
Finger
Wrapper
50. Malicious code that uses a polymorphic engine to mutate while keeping the original algorithm intact; the code changes itself each time it runs - but the function of the code will not change.
hardware keystroke logger
Digital Certificate
signature scanning
polymorphic virus
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests