SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Xmas Tree scan
Detective Controls
-sX
Exploit
404EE
2. An HTTP command to transmit text to a web server for processing. The opposite of an HTTP GET.
reconnaissance
Anonymizer
War Driving
POST
3. A portion of memory used to temporarily store output or input data.
Buffer
network access server
Hacks without permission
A S
4. A denial-of-service attack where the attacker sends a ping to the network's broadcast address from the spoofed IP address of the target. All systems in the subnet then respond to the spoofed address - eventually flooding the device.
false rejection rate (FRR)
Serial Line Internet Protocol (SLIP)
Smurf attack
Service Set Identifier (SSID)
5. Port 23
Worm
Telnet
Third Party
intranet
6. Activities to determine the extent to which a security control is implemented correctly - operating as intended - and producing the desired outcome with respect to meeting the security requirements for the system.
-sR
White Box Testing
Assessment
red team
7. A background process found in Unix - Linux - Solaris - and other Unix-based operating systems.
-sX
Daemon
SYN flood attack
Back orifice
8. A utility that traces a packet from your computer to an Internet host - showing how many hops the packet takes to reach the host and how long the packet requires to complete the hop.
Audit Trail
Traceroute
Virtual Local Area Network (VLAN)
Console Port
9. Phases of an attack
Reconnaissance - Scanning - Gaining Access - Maintaining Access - Covering Tracks
honeynet
parameter tampering
Overwhelm CAM table to convert switch to hub mode
10. A computer network confined to a relatively small area - such as a single building or campus - in which devices connect through high-frequency radio waves using IEEE standard 802.11.
Secure Sockets Layer (SSL)
Bluesnarfing
Wireless Local Area Network (WLAN)
Third Party
11. The rate at which a biometric system will incorrectly reject an access attempt by an authorized user.
Wired Equivalent Privacy (WEP)
Syslog
false rejection rate (FRR)
Boot Sector Virus
12. The result of using a private key to encrypt a hash value for identification purposes within a PKI system. The signature can be decoded by the originator's public key - verifying his identity and providing non-repudiation. A valid digital signature g
Computer Emergency Response Team (CERT)
Corrective Controls
Wi-Fi
Digital Signature
13. Also known as the dot-dot-slash attack. Using directory traversal - the attacker attempts to access restricted directories and execute commands outside intended web server directories by using the URL to redirect to an unintended folder location.
Confidentiality
ad hoc mode
Uniform Resource Locator (URL)
Directory Traversal
14. A list of IP addresses and corresponding MAC addresses stored on a local computer.
Daemon
Address Resolution Protocol (ARP) table
SYN attack
gray box testing
15. Network Scanning
SID
Last In First Out (LIFO)
parallel scan
A procedure for identifying active hosts on a network.
16. A protocol that uses a private key to encrypt data before transmitting confidential documents over the Internet; widely used on e-commerce - banking - and other sites requiring privacy.
SYN flood attack
War Driving
self encrypting
Secure Sockets Layer (SSL)
17. Incremental Substitution
Replacing numbers in a url to access other files
Extensible Authentication Protocol (EAP)
Internet Protocol Security (IPSec) architecture
Console Port
18. A software or hardware defect that often results in system vulnerabilities.
out-of-band signaling
Network Basic Input/Output System (NetBIOS)
separation of duties
Bug
19. Window Scan
John the Ripper - LOphtcrack - Ophtcrack - Cain and Abel
Directory Traversal
-sW
Uniform Resource Locator (URL)
20. A simple PPP authentication mechanism in which the user name and password are transmitted in clear text to prove identity. PAP compares the user name and password to a table listing authorized users.
Network Address Translation (NAT)
Password Authentication Protocol (PAP)
Domain Name
Request for Comments (RFC)
21. A structured set of criteria for evaluating computer security within products and systems produced by European countries; it has been largely replaced by the Common Criteria.
Information Technology Security Evaluation Criteria (ITSEC)
Digital Signature
International Organization for Standardization (ISO)
Defines legal email marketing
22. A standard for encrypting e-mail - web pages - and other stream-oriented information transmitted over the Internet.
Vulnerability Assessment
Whois
Zero Subnet
Transport Layer Security (TLS)
23. Normal scan timing
Asynchronous
SSH
sheepdip
parallel scan
24. The cyclical practice of identifying - classifying - remediating - and mitigating vulnerabilities.
Vulnerability Management
suicide hacker
Zombie
Information Technology (IT) asset valuation
25. The act of secretly listening to the private conversations of others without their consent. This can also be done over telephone lines (wiretapping) - e-mail - instant messaging - and other methods of communication considered private
Transmission Control Protocol (TCP)
Computer Emergency Response Team (CERT)
Eavesdropping
Secure Multipurpose Mail Extension (S/MIME)
26. A widely used authentication protocol developed at the MassachusettsInstitute of Technology (MIT). Kerberos authentication uses tickets - Ticket Granting Service - and Key Distribution Center.
operating system attack
Kerberos
pattern matching
shoulder surfing
27. A legal limit on the amount of financial liability and remedies the organization is responsible for taking on.
router
limitation of liability and remedies
Level II assessment
Password Authentication Protocol (PAP)
28. Idlescan
-sI
Back orifice
scope creep
Malware
29. Ping Scan
Information Technology (IT) infrastructure
War Driving
-sP
fragmentation
30. A free and popular version of the Unix operating system.
stateful packet filtering
HIDS
FreeBSD
Traceroute
31. An attack that combines a brute-force attack with a dictionary attack.
Domain Name System (DNS) lookup
hybrid attack
qualitative analysis
Denial of Service (DoS)
32. A distance-vector routing protocol that employs the hop count as a routing metric. The 'hold down time -' used to define how long a route is held in memory - is 180 seconds. RIP prevents routing loops by implementing a limit on the number of hops all
Echo request
operating system attack
sidejacking
Routing Information Protocol (RIP)
33. Created by the U.S. Federal Communications Commission to uniquely identify mobile devices; often represented as an 11-digit decimal number or eight-digit hexadecimal number.
parallel scan & 75 sec timeout & 0.3 sec/probe
R
Domain Name System (DNS)
Electronic serial number
34. A cryptographic attack where bits are manipulated in the ciphertext itself to generate a predictable outcome in the plaintext once it is decrypted.
-sX
Bit Flipping
firewall
Hypertext Transfer Protocol (HTTP)
35. A string used for authentication in SNMP. The public community string is used for read-only searches - whereas the private community string is used for read/write. Community strings are transmitted in clear text in SNMPv1. SNMPv3 provides encryption
shoulder surfing
XOR Operation
Cryptographic Key
Community String
36. A small Trojan program that listens on port 777.
shrink-wrap code attacks
Hacks with permission
Tini
Address Resolution Protocol (ARP)
37. A programming principle whereby the last piece of data added to the stack is the first piece of data taken off.
Cloning
HIDS
Last In First Out (LIFO)
Cold Site
38. A protocol for exchanging packets over a serial line.
SAM
Serial Line Internet Protocol (SLIP)
hot site
security defect
39. Hex 14
A R
Tunneling Virus
Wide Area Network (WAN)
serialize scans & 15 sec wait
40. A query and response protocol widely used for querying databases that store the registered users or assignees of an Internet resource - such as a domain name - an IP address - or an autonomous system.
John the Ripper - LOphtcrack - Ophtcrack - Cain and Abel
-oX
Whois
Possession of access devices
41. SYN Ping
-sS
-PS
-sW
network access server
42. A symmetric - block-cipher data-encryption standard that uses a variablelength key that can range from 32 bits to 448 bits.
Block Cipher
SID
Confidentiality
Blowfish
43. Terminal Access Controller Access-Control System. A remote authentication protocol that is used to communicate with an authentication server commonly used in Unix networks.
TACACS
network interface card (NIC)
scope creep
-sW
44. A nonnumerical - subjective risk evaluation. Used with qualitative assessment (an evaluation of risk that results in ratings of none - low - medium - and high for the probability.)
End User Licensing Agreement (EULA)
qualitative analysis
Request for Comments (RFC)
Assessment
45. A type of attack used to deny service to legitimate users of a network resource by intentionally overloading the network with illegitimate TCP connection requests. SYN packets are sent repeatedly to the target - but the corresponding SYN/ACK response
risk assessment
SYN flood attack
Syslog
Whois
46. A unique hostname that is used to identify resources on the Internet. Domain names start with a root (.) - then add a top level (.com - .gov - or .mil - for example) - and a given name space.
site survey
Master boot record infector
SNMP
Domain Name
47. Hex 04
Block Cipher
R
suicide hacker
Contingency Plan
48. A symmetric key cryptographic algorithm that transforms a block of information at a time using a cryptographic key. For a block cipher algorithm - the length of the input block is the same as the length of the output block.
Block Cipher
Active Attack
Wi-Fi Protected Access (WPA)
Malware
49. The rate at which a biometric system will incorrectly identify an unauthorized individual and allow them access (see false negative).
risk acceptance
False Acceptance Rate (FAR)
-sT
Tunneling Virus
50. A protocol used to pass control and error messages between nodes on the Internet.
rule-based access control
Internet Control Message Protocol (ICMP)
Written Authorization
Videocipher II Satellite Encryption System