SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A routing protocol developed to be used within a single organization.
Interior Gateway Protocol (IGP)
Wrapper
security by obscurity
fully qualified domain name (FQDN)
2. A device that provides access between two or more networks. Gateways are typically used to connect dissimilar networks.
gateway
iris scanner
Vulnerability Assessment
Certificate
3. An attack where the hacker positions himself between the client and the server - to intercept (and sometimes alter) data traveling between the two.
Man-in-the-middle attack
intrusion detection system (IDS)
MD5
Data Encryption Standard (DES)
4. An application that monitors a computer or network to identify - and prevent - malware. AV is usually signature-based - and can take multiple actions on defined malware files/activity.
Filter
remote procedure call (RPC)
gap analysis
Antivirus (AV) software
5. A remote control program in which the client runs on a local computer and connects to a remote server on a network. Commands entered locally are executed on the remote system.
Telnet
keylogger
gap analysis
protocol stack
6. Actions - devices - procedures - techniques - or other measures intended to reduce the vulnerability of an information system.
EDGAR database
Service Set Identifier (SSID)
Countermeasures
serialize scans & 15 sec wait
7. A virus that plants itself in a system's boot sector and infects the master boot record.
Boot Sector Virus
protocol
intrusion detection system (IDS)
RPC-DCOM
8. An agreement between the penetration tester and the client detailing the activities the tester is permitted to perform.
A series of messages sent by someone attempting to break into a computer to learn about the computer's network services.
Administratively Prohibited
War Dialing
Written Authorization
9. LAN standard - defined by ANSI X3T9.5 - specifying a 100Mbps token-passing network using fiber-optic cable and a dualring architecture for redundancy - with transmission distances of up to two kilometers.
integrity
Digital Watermarking
net use \[target ip]IPC$ '' /user:''
Fiber Distributed Data Interface (FDDI)
10. A free and popular version of the Unix operating system.
session splicing
FreeBSD
gap analysis
session hijacking
11. A protocol used to pass control and error messages between nodes on the Internet.
Internet Control Message Protocol (ICMP)
Routing Protocol
payload
Videocipher II Satellite Encryption System
12. Method used by antivirus software to detect new - unknown viruses that have not yet been identified; based on a piece-by-piece examination of a program - looking for a sequence or sequences of instructions that differentiate the virus from 'normal' p
heuristic scanning
Computer Emergency Response Team (CERT)
Address Resolution Protocol (ARP) table
-sL
13. A computer placed outside a firewall to provide public services to other Internet sites - and hardened to resist external attacks.
Tunneling
Antivirus (AV) software
Event
Bastion host
14. A principle in security engineering that attempts to use anonymity and secrecy (of design - implementation - and so on) to provide security; the footprint of the organization - entity - network - or system is kept as small as possible to avoid intere
audit
gray hat
security by obscurity
Third Party
15. A protocol that uses a private key to encrypt data before transmitting confidential documents over the Internet; widely used on e-commerce - banking - and other sites requiring privacy.
remote procedure call (RPC)
Local Administrator
Backdoor
Secure Sockets Layer (SSL)
16. Idlescan
replay attack
Mantrap
-sI
smart card
17. Port 110
DNS
Timestamping
POP 3
Active Fingerprinting
18. The monetary value expected from the occurrence of a risk on an asset. It is mathematically expressed as single loss expectancy (SLE) = asset value (AV)
Directory Traversal
single loss expectancy (SLE)
hashing algorithm
sheepdip
19. The process of embedding information into a digital signal in a way that makes it difficult to remove.
Internet Control Message Protocol (ICMP)
War Dialing
Digital Watermarking
Asymmetric
20. SYN Ping
-PS
hybrid attack
Interior Gateway Protocol (IGP)
Ethical Hacker
21. Layer 6 of the OSI reference model. The Presentation layer ensures information sent by the Application layer of the sending system will be readable by the Application layer of the receiving system.
passive attack
Presentation layer
Audit Trail
Wrapper
22. A computer virus that infects and spreads in multiple ways.
Bastion host
GET
Multipartite virus
security by obscurity
23. A computer security expert who performs security audits and penetration tests against systems or network segments - with the owner's full knowledge and permission - in an effort to increase security.
Ethical Hacker
queue
security breach or security incident
fragmentation
24. An Internet routing protocol used to exchange routing information within an autonomous system.
Acceptable Use Policy (AUP)
Trusted Computer System Evaluation Criteria (TCSEC)
The automated process of proactively identifying vulnerabilities of computing systems present in a network
Interior Gateway Protocol (IGP)
25. A social-engineering effort in which the attacker pretends to be an employee - a valid user - or even an executive to elicit information or access.
Digital Signature
Bastion host
HIDS
impersonation
26. A connectionless - layer 4 transport protocol. UDP is faster than TCP - but offers no reliability. A best effort is made to deliver the data - but no checks and verifications are performed to guarantee delivery. Therefore - UDP is termed a 'connectio
Wrapper
Collision Domain
User Datagram Protocol (UDP)
R
27. A record showing which user has accessed a given resource and what operations the user performed during a given period.
Audit Trail
route
False Acceptance Rate (FAR)
Hacks with permission
28. A method of external testing whereby several systems or resources are used together to effect an attack.
Daisy Chaining
Archive
HTTP tunneling
encryption
29. An attack that is direct in nature - usually where the attacker injects something into - or otherwise alters - the network or system target.
Tunnel
Active Attack
Fast Ethernet
asynchronous transmission
30. A type of malware that covertly collects information about a user.
spyware
-sF
Filter
remote access
31. A defined measure of service within a network system
Asynchronous
physical security
Lightweight Directory Access Protocol (LDAP)
quality of service (QoS)
32. The process of pinging each address within a subnet to map potential targets. Ping sweeps are unreliable and easily detectable - but very fast.
symmetric encryption
Algorithm
red team
ping sweep
33. Malware designed to install some sort of virus - backdoor - and so on - on a target system.
Mandatory access control (MAC)
Certificate Authority (CA)
Droppers
intrusion detection system (IDS)
34. A method for detecting malicious code on a computer where the files are compared to signatures of known viruses stored in a database.
signature scanning
protocol stack
End User Licensing Agreement (EULA)
-sX
35. A nonroutable IP address range intended for use only within the confines of a single organization - falling within the predefined ranges of 10.0.0.0 - 172.16-31.0.0 - or 192.168.0.0.
Data Link layer
secure channel
local area network (LAN)
private network address
36. A group of experts that handles computer security incidents.
Cryptographic Key
Simple Mail Transfer Protocol (SMTP)
Tumbling
security incident response team (SIRT)
37. Sneaky scan timing
Tiger Team
serialize scans & 15 sec wait
Authentication
Data Link layer
38. A term representing the responsibility managers and their organizations have to provide information security to ensure the type of control - the cost of control - and the deployment of control are appropriate for the system being managed.
War Driving
Due Care
Information Technology (IT) asset criticality
Replacing numbers in a url to access other files
39. Attacks on the actual programming code of an application.
Information Technology (IT) infrastructure
FTP
Denial of Service (DoS)
Application-Level Attacks
40. Also known as a public key certificate - this is an electronic file that is used to verify a user's identity - providing non-repudiation throughout the sys-tem. Certificates contain the entity's public key - serial number - version - subject - algori
network access server
Master boot record infector
Digital Certificate
Open System Interconnection (OSI) Reference Model
41. The process of recording activity on a system for monitoring and later review.
Auditing
Authorization
Hypertext Transfer Protocol Secure (HTTPS)
Tumbling
42. A simple PPP authentication mechanism in which the user name and password are transmitted in clear text to prove identity. PAP compares the user name and password to a table listing authorized users.
Baseline
Copyright
Password Authentication Protocol (PAP)
proxy server
43. A standard that provides best-practice recommendations on information security management for use by those responsible for initiating - implementing - or maintaining Information Security Management Systems (ISMS). Information security is defined with
Annualized Loss Expectancy (ALE)
ISO 17799
keylogger
Asset
44. A type of DNS transfer - where all records from an SOA are transmitted to the requestor. Zone transfers have two options: full (opcode AXFR) and incremental (IXFR).
Defines legal email marketing
Virus
reverse social engineering
Zone transfer
45. An attack against an authentication protocol in which the attacker intercepts data in transit along the network between the claimant and verifier - but does not alter the data (in other words - eavesdropping).
sidejacking
passive attack
Collision Domain
Authentication - Authorization - and Accounting (AAA)
46. Nmap normal output
public key
-PB
Certificate
-oN
47. A protocol defining packets that are able to be routed by a router.
Audit Data
routed protocol
Self Replicating
Antivirus (AV) software
48. A TCP flag notifying an originating station that the preceding packet (or packets) has been received.
Acknowledgment (ACK)
-sW
overt channel
security by obscurity
49. Calculations of two components of risk: R - the magnitude of the potential loss (L) - and the probability - p - that the loss will occur.
Baseline
Dumpster Diving
A S
quantitative risk assessment
50. An information assurance strategy in which multiple layers of defense are placed throughout an Information Technology system.
Defense in Depth
Secure Sockets Layer (SSL)
Threat
risk avoidance