SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Controls internal to a system designed to resolve vulnerabilities and errors soon after they arise.
Corrective Controls
Zero Subnet
Bit Flipping
Internal access to the network
2. An international organization composed of national standards bodies from over 75 countries. Developed the OSI reference model.
quantitative risk assessment
Overwhelm CAM table to convert switch to hub mode
Worm
International Organization for Standardization (ISO)
3. A program or piece of code inserted into a system - usually covertly - with the intent of compromising the confidentiality - integrity - or availability of the victim's data - applications - or operating system. Malware consists of viruses - worms -
Request for Comments (RFC)
End User Licensing Agreement (EULA)
service level agreements (SLAs)
Malware
4. nmap
--randomize_hosts -O OS fingerprinting
parallel scan & 300 sec timeout & 1.25 sec/probe
initial sequence number (ISN)
Third Party
5. Created by the U.S. Federal Communications Commission to uniquely identify mobile devices; often represented as an 11-digit decimal number or eight-digit hexadecimal number.
Internet Assigned Number Authority (IANA)
Electronic serial number
Bluejacking
Vulnerability Scanning
6. Using conversation or some other interaction between people to gather useful information.
nslookup
infrastructure mode
human-based social engineering
session hijacking
7. Software that has advertisements embedded within. Generally displays ads in the form of pop-ups.
Adware
Cracker
Worm
port scanning
8. ex 02
network operations center (NOC)
Simple Network Management Protocol (SNMP)
HTTP
S
9. Layer 7 of the OSI reference model. The Application layer provides services to applications - which allow them access to the network. Protocols such as FTP and SMTP reside here.
Application Layer
Discretionary Access Control (DAC)
asynchronous transmission
Buffer Overflow
10. A virus that plants itself in a system's boot sector and infects the master boot record.
Boot Sector Virus
Discretionary Access Control (DAC)
Simple Mail Transfer Protocol (SMTP)
router
11. A group of people - gathered together by a business entity - working to address a specific problem or goal.
flood
Tiger Team
sniffer
phishing
12. A remote control program in which the client runs on a local computer and connects to a remote server on a network. Commands entered locally are executed on the remote system.
role-based access control
HTTP tunneling
-PT
Telnet
13. Traffic-passing technique used by bridges and switches in which traffic received on an interface is sent out all interfaces on the device except the interface on which the information was originally received. Traffic on a switch is flooded when it is
flood
encryption
Cold Site
limitation of liability and remedies
14. In penetration testing - this is a method of testing the security of a system or subnet without any previous knowledge of the device or network. Designed to simulate an attack by an outside intruder (usually from the Internet).
Post Office Protocol 3 (POP3)
Block Cipher
Black Box Testing
source routing
15. An anonymous connection to an administrative share (IPC$) on a Windows machine. Null sessions allow for enumeration of Windows machines - among other attacks.
null session
Bluejacking
Collision Domain
Collision
16. White hat
Hacks with permission
spam
RxBoot
spyware
17. An agreement between the penetration tester and the client detailing the activities the tester is permitted to perform.
session splicing
Adware
polymorphic virus
Written Authorization
18. A physical security attack where the attacker sifts through garbage and recycle bins for information that may be useful on current and future attacks
Dumpster Diving
DNS
intrusion prevention system (IPS)
Vulnerability Management
19. IP Protocol Scan
-sO
Droppers
SAM
Computer Emergency Response Team (CERT)
20. A security protocol used in IEEE 802.11i to replace WEP without the requirement to replace legacy hardware.
gray hat
Trapdoor Function
integrity
Temporal Key Integrity Protocol (TKIP)
21. Normal scan timing
Kerberos
parallel scan
Asymmetric
Active Directory (AD)
22. A software or hardware application or device that captures user keystrokes.
keylogger
Overwhelm CAM table to convert switch to hub mode
LDAP
hacktivism
23. A unique hostname that is used to identify resources on the Internet. Domain names start with a root (.) - then add a top level (.com - .gov - or .mil - for example) - and a given name space.
Domain Name
-oX
Bit Flipping
Cryptography
24. Policy stating what users of a system can and cannot do with the organization's assets.
Acceptable Use Policy (AUP)
asynchronous transmission
Level II assessment
Address Resolution Protocol (ARP)
25. An Application layer protocol for sending electronic mail between servers.
Biometrics
Authorization
RID Resource identifier
Simple Mail Transfer Protocol (SMTP)
26. A network architecture framework developed by ISO that describes the communications process between two systems across the Internet in seven distinct layers.
Open System Interconnection (OSI) Reference Model
Cryptographic Key
operating system attack
-oG
27. The subjective - potential percentage of loss to a specific asset if a specific threat is realized. The exposure factor (EF) is a subjective value the person assessing risk must define.
Database
Hacks with permission
Exposure Factor
security by obscurity
28. A method of permitting only MAC addresses in a preapproved list network access. Addresses not matching are blocked.
Request for Comments (RFC)
MAC filtering
Zone transfer
Local Administrator
29. CAN-SPAM
Defines legal email marketing
Level III assessment
ring topology
Challenge Handshake Authentication Protocol (CHAP)
30. Physical socket provided on routers and switches for cable connections between a computer and the router/switch. This connection enables the computer to configure - query - and troubleshoot the router/switch by use of a terminal emulator and a comman
Syslog
Audit Trail
encapsulation
Console Port
31. An evaluation consisting of a document review - interviews - and demonstrations. No hands-on testing is performed.
Redundant Array of Independent Disks (RAID)
Internet Assigned Number Authority (IANA)
Level I assessment
HTTP tunneling
32. Hashing algorithm that results in a 128-bit output.
Daisy Chaining
Information Technology Security Evaluation Criteria (ITSEC)
patch
MD5
33. Drawing symbols in public places to alert others to an open Wi-Fi network. War chalking can include the SSIDs - administrative passwords to APs - and other information.
War Chalking
social engineering
Hypertext Transfer Protocol (HTTP)
signature scanning
34. The lack of clocking (imposed time ordering) on a bit stream.
Asynchronous
Internet Control Message Protocol (ICMP)
Domain Name System (DNS) lookup
Application Layer
35. A device that receives and sends data packets between two or more networks; the packet headers and a forwarding table provide the router with the information necessary for deciding which interface to use to forward packets.
Eavesdropping
router
Point-to-Point Protocol (PPP)
Address Resolution Protocol (ARP)
36. Nmap grepable output
Man-in-the-middle attack
-oG
Zenmap
public key
37. A computer placed outside a firewall to provide public services to other Internet sites - and hardened to resist external attacks.
Bastion host
parameter tampering
Finding a directory listing and gaining access to a parent or root file for access to other files
Dumpster Diving
38. When an authorized person allows (intentionally or unintentionally) someone to pass through a secure door - despite the fact that the intruder does not have a badge.
piggybacking
signature scanning
Point-to-Point Protocol (PPP)
Service Set Identifier (SSID)
39. A tool that helps a company to compare its actual performance with its potential performance.
gap analysis
NetBSD
queue
Hacks with permission
40. A pen testing method where the attacker knows all information about the internal network. It is designed to simulate an attack by a disgruntled systems administrator - or similar level.
Third Party
White Box Testing
Copyright
network access server
41. A wireless networking mode where all clients connect to the wireless network through a central access point.
Presentation layer
Computer-Based Attack
Wi-Fi Protected Access (WPA)
infrastructure mode
42. Establish Null Session
net use \[target ip]IPC$ '' /user:''
Certificate
integrity
-oA
43. A storage buffer that transparently stores data so future requests for the same data can be served faster.
Temporal Key Integrity Protocol (TKIP)
Backdoor
Cache
Internet Assigned Number Authority (IANA)
44. Software code - a portion of data - or sequence of commands intended to take advantage of a bug or vulnerability in order to cause unintended or unanticipated behavior to occur on computer software or hardware.
Exploit
halo effect
Common Internet File System/Server Message Block
Port Address Translation (PAT)
45. A person or entity indirectly involved in a relationship between two principles.
Digital Signature
Internet Assigned Number Authority (IANA)
Third Party
Mandatory access control (MAC)
46. The process of systematically testing each port on a firewall to map rules and determine accessible ports.
router
Hypertext Transfer Protocol Secure (HTTPS)
firewalking
false rejection rate (FRR)
47. The last portion of the SID that identifies the user to the system in Windows. A RID of 500 identifies the administrator account.
Redundant Array of Independent Disks (RAID)
RID Resource identifier
service level agreements (SLAs)
Ethernet
48. A denial-of-service attack where the attacker sends a ping to the network's broadcast address from the spoofed IP address of the target. All systems in the subnet then respond to the spoofed address - eventually flooding the device.
Electronic serial number
Smurf attack
Trusted Computer Base (TCB)
Cryptography
49. A stand-alone computer - kept off the network - that is used for scanning potentially malicious media or software.
Overwhelm CAM table to convert switch to hub mode
sheepdip
Dumpster Diving
Block Cipher
50. A social-engineering attack using computer resources - such as e-mail or IRC.
Secure Multipurpose Mail Extension (S/MIME)
Computer-Based Attack
promiscuous mode
Authentication