SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. An announcement - typically from a software vendor - of a known security vulnerability in a program; often the bulletin contains instructions for the application of a software patch.
asynchronous transmission
security bulletins
Unicode
Internet Control Message Protocol (ICMP)
2. In computer security - this is an algorithm that uses separate keys for encryption and decryption.
Network Address Translation (NAT)
802.11
halo effect
Asymmetric Algorithm
3. Confidentiality - Integrity - and Availability are the three aspects of security and make up the triangle.
service level agreements (SLAs)
initial sequence number (ISN)
CIA triangle
CAM table
4. A social-engineering effort in which the attacker pretends to be an employee - a valid user - or even an executive to elicit information or access.
Information Technology (IT) asset valuation
net use \[target ip]IPC$ '' /user:''
forwarding
impersonation
5. Activities to determine the extent to which a security control is implemented correctly - operating as intended - and producing the desired outcome with respect to meeting the security requirements for the system.
Echo request
Assessment
Real application encompassing Trojan
Finger
6. A three-step process computers execute to negotiate a connection with one another. The three steps are SYN - SYN/ACK - ACK.
Lightweight Directory Access Protocol (LDAP)
-PT
Three-Way (TCP) Handshake
network access server
7. Software or hardware components that restrict access between a protected network and the Internet - or between other sets of networks - to block unwanted use or attacks.
Written Authorization
firewall
Telnet
Presentation layer
8. An Application layer protocol for sending electronic mail between servers.
Simple Mail Transfer Protocol (SMTP)
R
steganography
False Acceptance Rate (FAR)
9. Traffic-passing technique used by bridges and switches in which traffic received on an interface is sent out all interfaces on the device except the interface on which the information was originally received. Traffic on a switch is flooded when it is
flood
SYN flood attack
local area network (LAN)
Biometrics
10. A condition that occurs when more data is written to a buffer than it has space to store - and results in data corruption or other system errors. This is usually due to insufficient bounds checking - a bug - or improper configuration in the program c
Banner Grabbing
hardware keystroke logger
Buffer Overflow
false negative
11. UDP Scan
nslookup
intrusion detection system (IDS)
Contingency Plan
-sU
12. TCP SYN Scan
patch
ring topology
impersonation
-sS
13. The central part of a computer or communications system hardware firmware - and software that implements the basic security procedures for controlling access to system resources.
Finger
security kernel
Access Point (AP)
-sO
14. Establish Null Session
hybrid attack
Replacing numbers in a url to access other files
net use \[target ip]IPC$ '' /user:''
-sW
15. A communications path - such as the Internet - authorized for data transmission within a computer system or network.
Trusted Computer System Evaluation Criteria (TCSEC)
overt channel
Bit Flipping
Covert Channel
16. A firewall evasion technique whereby packets are wrapped in HTTP - as a covert channel to the target.
Electronic Code Book (ECB)
overt channel
HTTP tunneling
Tunneling
17. A communications channel that is being used for a purpose it was not intended for - usually to transfer information secretly.
Assessment
Electronic serial number
Covert Channel
integrity
18. A symmetric - block-cipher data-encryption standard that uses a variablelength key that can range from 32 bits to 448 bits.
Possession of access devices
Telnet
reconnaissance
Blowfish
19. A type 0 ICMP message used to reply to ECHO requests. Used with ping to verify network layer connectivity between hosts.
ECHO reply
Web Spider
Virtual Private Network (VPN)
-sV
20. A wireless access point that has either been installed on a secure company network without explicit authorization from a local network administrator - or has been created to allow a hacker to conduct a man-in-the-middle attack.
Extensible Authentication Protocol (EAP)
Wrapper
rogue access point
Client
21. Sending unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobile phones - PDAs - or laptop computers.
File Allocation Table (FAT)
network access server
-sT
Bluejacking
22. A security tool designed to protect a system or network against attacks by comparing traffic patterns against a list of both known attack signatures and general characteristics of how attacks may be carried out. Threats are rated and reported.
security by obscurity
intrusion detection system (IDS)
flood
Zombie
23. The process of attaching a particular protocol header and trailer to a unit of data before transmission on the network. Occurs at layer 2 of the OSI reference model.
encapsulation
remote procedure call (RPC)
Ciphertext
Digital Watermarking
24. A set of related communications protocols operating together as a group to address communication at some or all of the seven layers of the OSI reference model.
local area network (LAN)
Echo Reply
Authentication
protocol stack
25. Any kind of connection that allows you to see all traffic passing by. Generally used in reference to a NIDS (network-based IDS) to monitor all traffic.
Trusted Computer System Evaluation Criteria (TCSEC)
local area network (LAN)
network tap
-sT
26. A programming principle whereby the last piece of data added to the stack is the first piece of data taken off.
Baseline
Last In First Out (LIFO)
signature scanning
separation of duties
27. A method of falsely identifying the source of data packets; often used by hackers to make it difficult to trace where an attack originated.
Last In First Out (LIFO)
spoofing
Macro virus
The automated process of proactively identifying vulnerabilities of computing systems present in a network
28. A Windows-based GUI version of nmap.
port scanning
router
Zenmap
Acknowledgment (ACK)
29. The software product or system that is the subject of an evaluation.
Target Of Engagement (TOE)
ISO 17799
rootkit
Asymmetric Algorithm
30. All measures and techniques taken to gather information about an intended target. Footprinting can be passive or active.
HTTP
sniffer
Methodology
footprinting
31. Wireless LAN standards created by IEEE. 802.11a runs at up to 54Mbps at 5GHz - 802.11b runs at 11Mbps at 2.4GHz - 802.11g runs at 54Mbps at 2.4GHz - and 802.11n can run upwards of 150MBps.
security controls
Daemon
802.11
Rijndael
32. A networking configuration where all nodes are connected in a circle with no terminated ends on the cable.
Virtual Private Network (VPN)
Post Office Protocol 3 (POP3)
ping sweep
ring topology
33. Phases of an attack
Reconnaissance - Scanning - Gaining Access - Maintaining Access - Covering Tracks
-PM
overt channel
quality of service (QoS)
34. IP Protocol Scan
Droppers
Timestamping
Transport Layer Security (TLS)
-sO
35. When an authorized person allows (intentionally or unintentionally) someone to pass through a secure door - despite the fact that the intruder does not have a badge.
piggybacking
hash
Hypertext Transfer Protocol (HTTP)
Wi-Fi
36. A security objective that ensures a resource can be accessed only by authorized users. This is also the property that sensitive information is not disclosed to unauthorized individuals - entities - or processes.
Confidentiality
hashing algorithm
ring topology
Mandatory access control (MAC)
37. An anonymous connection to an administrative share (IPC$) on a Windows machine. Null sessions allow for enumeration of Windows machines - among other attacks.
Demilitarized Zone (DMZ)
role-based access control
null session
POP 3
38. Attacks that take advantage of the built-in code and scripts most off-the-shelf applications come with.
Tunneling
Methodology
shrink-wrap code attacks
Replacing numbers in a url to access other files
39. A software or hardware defect that often results in system vulnerabilities.
social engineering
Bug
FTP
Community String
40. Unauthorized access to information such as a calendar - contact list - e-mails - and text messages on a wireless device through a Bluetooth connection.
-oX
SMB
Black Box Testing
Bluesnarfing
41. An organized collection of data.
piggybacking
Database
GET
Access Point (AP)
42. A technology that establishes a tunnel to create a private - dedicated - leased-line network over the Internet. The data is encrypted so it's readable only by the sender and receiver. Companies commonly use VPNs to allow employees to connect securely
Virtual Private Network (VPN)
Zombie
parallel scan & 300 sec timeout & 1.25 sec/probe
Computer Emergency Response Team (CERT)
43. The science or study of protecting information - whether in transit or at rest - by using techniques to render the information unusable to anyone who does not possess the means to decrypt it.
iris scanner
Cryptography
Black Box Testing
human-based social engineering
44. A non-self-replicating program that appears to have a useful purpose - but in reality has a different - malicious purpose.
Third Party
Trojan Horse
Decryption
R
45. A mathematical operation requiring two binary inputs: If the inputs match - the output is a 0 - otherwise it is a 1.
XOR Operation
sniffer
Address Resolution Protocol (ARP) table
Presentation layer
46. A system used by the Securities and Exchange Commission (SEC) for companies and businesses to transmit required filings and information. The EDGAR database performs automated collection - validation - indexing - acceptance - and forwarding of submiss
infrastructure mode
EDGAR database
reverse social engineering
initial sequence number (ISN)
47. A widely used authentication protocol developed at the MassachusettsInstitute of Technology (MIT). Kerberos authentication uses tickets - Ticket Granting Service - and Key Distribution Center.
Cracker
Kerberos
forwarding
CIA triangle
48. A card with a built-in microprocessor and memory used for identification or financial transactions. The card transfers data to and from a central computer when inserted into a reader.
halo effect
port scanning
protocol stack
smart card
49. Any circumstance or event with the potential to adversely impact organizationaloperations - organizational assets - or individuals through an information system via unauthorized access - destruction - disclosure - modification of information - and/or
Threat
Malicious code
Open System Interconnection (OSI) Reference Model
symmetric algorithm
50. In penetration testing - this is a method of testing the security of a system or subnet without any previous knowledge of the device or network. Designed to simulate an attack by an outside intruder (usually from the Internet).
port knocking
Active Directory (AD)
Black Box Testing
Exposure Factor