SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A U.S. Department of Defense (DoD) standard that sets basic requirements for assessing the effectiveness of computer security controls built into a computer system.
routed protocol
Client
hybrid attack
Trusted Computer System Evaluation Criteria (TCSEC)
2. A device providing temporary - on-demand - point-to-point network access to users.
Level I assessment
Trojan Horse
network access server
Digital Watermarking
3. Directing a protocol from one port to another.
Third Party
Anonymizer
-oA
port redirection
4. In regard to hash algorithms - this occurs when two or more distinct inputs produce the same output.
segment
Collision
honeynet
Vulnerability
5. A hybrid of the HTTP and SSL/TLS protocols that provides encrypted communication and secure identification of a web server.
Hypertext Transfer Protocol Secure (HTTPS)
Simple Mail Transfer Protocol (SMTP)
ring topology
segment
6. The directory service created by Microsoft for use on itsnetworks. Provides a variety of network services using Lightweight Directory Access Protocol (LDAP) - Kerberos-based authentication - and single sign-on for user access to network-based resourc
Self Replicating
Lightweight Directory Access Protocol (LDAP)
Active Directory (AD)
802.11 i
7. A list of IP addresses and corresponding MAC addresses stored on a local computer.
Address Resolution Protocol (ARP) table
personal identification number (PIN)
Third Party
Asymmetric Algorithm
8. An unknown deficiency in software or some other product that results in a security vulnerability being identified.
segment
Minimum acceptable level of risk
security defect
Competitive Intelligence
9. The rate at which a biometric system will incorrectly reject an access attempt by an authorized user.
false rejection rate (FRR)
Whois
risk assessment
Event
10. A network deployed as a trap to detect - deflect - or deter unauthorized use of information systems.
spoofing
quantitative risk assessment
Fraud and related activity in connection with computers
honeynet
11. A method for detecting malicious code on a computer where the files are compared to signatures of known viruses stored in a database.
Uniform Resource Locator (URL)
signature scanning
-sX
-b
12. An agreement between the penetration tester and the client detailing the activities the tester is permitted to perform.
-PP
Written Authorization
Acceptable Use Policy (AUP)
False Acceptance Rate (FAR)
13. Also known as the dot-dot-slash attack. Using directory traversal - the attacker attempts to access restricted directories and execute commands outside intended web server directories by using the URL to redirect to an unintended folder location.
FreeBSD
Computer-Based Attack
SMB
Directory Traversal
14. Port 389
Reconnaissance - Scanning - Gaining Access - Maintaining Access - Covering Tracks
SMB
LDAP
halo effect
15. A device set up to send a response on behalf of an end node to the requesting host. Proxies are generally used to obfuscate the host from the Internet.
Tiger Team
proxy server
Hypertext Transfer Protocol (HTTP)
Console Port
16. A malicious computer program with self-replication capabilities that attaches to another file and moves with the host from one computer to another.
Cloning
Virus
hardware keystroke logger
Audit Data
17. A formal set of rules describing data transmission - especially across a network. A protocol determines the type of error checking - the data compression method - how the sending device will indicate completion - how the receiving device will indicat
protocol
Crossover Error Rate (CER)
Time Bomb
File Allocation Table (FAT)
18. A TCP flag notifying an originating station that the preceding packet (or packets) has been received.
Uniform Resource Locator (URL)
Acknowledgment (ACK)
Confidentiality
Collision Domain
19. A measurable - physical characteristic used to recognize the identity - or verify the claimed identity - of an applicant. Facial images - fingerprints - and handwriting samples are all examples of biometrics.
Finding a directory listing and gaining access to a parent or root file for access to other files
Virtual Private Network (VPN)
Worm
Biometrics
20. The act of dialing all numbers within an organization to discover open modems.
Extensible Authentication Protocol (EAP)
War Dialing
security kernel
remote access
21. A type of denial-of-service attack where a hacker sends thousands of SYN packets to the target with spoofed IP addresses.
Information Technology (IT) asset valuation
Port Address Translation (PAT)
SYN attack
Active Directory (AD)
22. Black hat
Exposure Factor
Hacks without permission
Eavesdropping
hacktivism
23. A type of encryption where the same key is used to encrypt and decrypt the message.
Archive
SYN attack
symmetric encryption
non-repudiation
24. A protocol used to pass control and error messages between nodes on the Internet.
Self Replicating
Internet Control Message Protocol (ICMP)
honeynet
ECHO reply
25. A nonroutable IP address range intended for use only within the confines of a single organization - falling within the predefined ranges of 10.0.0.0 - 172.16-31.0.0 - or 192.168.0.0.
private network address
logic bomb
open source
Information Technology (IT) asset valuation
26. don't ping
-P0
Antivirus (AV) software
symmetric encryption
Client
27. A standard for encrypting and authenticating MIME data; used primarily for Internet e-mail.
integrity
-sO
Decryption
Secure Multipurpose Mail Extension (S/MIME)
28. Paranoid scan timing
Service Set Identifier (SSID)
serial scan & 300 sec wait
-PS
source routing
29. An attack that combines a brute-force attack with a dictionary attack.
Console Port
Address Resolution Protocol (ARP)
hybrid attack
Crossover Error Rate (CER)
30. A type of attack used to deny service to legitimate users of a network resource by intentionally overloading the network with illegitimate TCP connection requests. SYN packets are sent repeatedly to the target - but the corresponding SYN/ACK response
SYN flood attack
SID
Dumpster Diving
Interior Gateway Protocol (IGP)
31. An announcement - typically from a software vendor - of a known security vulnerability in a program; often the bulletin contains instructions for the application of a software patch.
Vulnerability Assessment
network interface card (NIC)
security bulletins
Demilitarized Zone (DMZ)
32. A unique hostname that is used to identify resources on the Internet. Domain names start with a root (.) - then add a top level (.com - .gov - or .mil - for example) - and a given name space.
EDGAR database
Hacks without permission
-sO
Domain Name
33. A set of rules defined to screen network packets based on source address - destination address - or protocol; these rules determine whether the packet will be forwarded or discarded.
Black Box Testing
Filter
Pretty Good Privacy (PGP)
Defines legal email marketing
34. Polite scan timing
serialize scans & 0.4 sec wait
human-based social engineering
Echo Reply
Hypertext Transfer Protocol (HTTP)
35. A security objective that ensures a resource can be accessed only by authorized users. This is also the property that sensitive information is not disclosed to unauthorized individuals - entities - or processes.
impersonation
Information Technology (IT) security architecture and framework
Confidentiality
Audit Trail
36. A utility that sends an ICMP Echo message to determine if a specific IP address is accessible; if the message receives a reply - the address is reachable.
Packet Internet Groper (ping)
Internet Protocol Security (IPSec) architecture
Level I assessment
asynchronous transmission
37. Recording the time - normally in a log file - when an event happens or when information is created or modified.
Timestamping
Internet Control Message Protocol (ICMP)
Man-in-the-middle attack
Wi-Fi
38. A hacking method for stealing the cookies used during a session build and replaying them for unauthorized connection purposes.
sidejacking
Event
A procedure for identifying active hosts on a network.
CNAME record
39. Conversion of plaintext to ciphertext through the use of a cryptographic algorithm.
War Driving
encryption
rootkit
Virus
40. Controls internal to a system designed to resolve vulnerabilities and errors soon after they arise.
Level II assessment
Corrective Controls
scope creep
inference attack
41. A protocol that uses a private key to encrypt data before transmitting confidential documents over the Internet; widely used on e-commerce - banking - and other sites requiring privacy.
Auditing
Secure Sockets Layer (SSL)
Trusted Computer Base (TCB)
quantitative risk assessment
42. A connection-oriented - layer 4 protocol for transporting data over network segments. TCP is considered reliable because it guarantees delivery and the proper reordering of transmitted packets. This protocol is used for most long-haul traffic on the
POP 3
Telnet
false rejection rate (FRR)
Transmission Control Protocol (TCP)
43. An inspection of a place where a company or individual proposes to work - to gather the necessary information for a design or risk assessment.
inference attack
site survey
security defect
port knocking
44. The default network authentication suite of protocols for Windows NT 4.0
NT LAN Manager (NTLM)
separation of duties
Traceroute
-sX
45. An Ethernet networking system transmitting data at 100 million bits per second (Mbps) - 10 times the speed of an earlier Ethernet standard. Derived from the Ethernet 802.3 standard - it is also known as 100BaseT.
Fast Ethernet
enumeration
NOP
802.11 i
46. Text or data in its encrypted form; the result of plaintext being input into a cryptographic algorithm.
NOP
Wiretapping
Ciphertext
-oA
47. An attack that exploits the common mistake many people make when installing operating systems
operating system attack
Whois
encryption
Virus
48. Cracking Tools
Hierarchical File System (HFS)
John the Ripper - LOphtcrack - Ophtcrack - Cain and Abel
Simple Network Management Protocol (SNMP)
SMB
49. 1. The path a packet travels to reach the intended destination. Each individual device along the path traveled is called a hop. 2. Information contained on a device containing instructions for reaching other nodes on the network. This information can
--randomize_hosts -O OS fingerprinting
Trusted Computer Base (TCB)
route
Filter
50. A small space having two sets of interlocking doors; the first set of doors must close before the second set opens. Typically authentication is required for each door - often using different factors. For example - a smart card may open the first door
Event
security by obscurity
Electronic serial number
Mantrap
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests