SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A measurable - physical characteristic used to recognize the identity - or verify the claimed identity - of an applicant. Facial images - fingerprints - and handwriting samples are all examples of biometrics.
XOR Operation
Wide Area Network (WAN)
halo effect
Biometrics
2. Chronological record of system activities to enable the reconstruction and examination of the sequence of events and changes in an event.
Telnet
Availability
Audit Data
Trusted Computer Base (TCB)
3. Hex 29
Black Box Testing
Information Technology (IT) security architecture and framework
U P F
heuristic scanning
4. An e-mail protection method using a secret message or image that can be referenced on any official communication with the site; if an e-mail is received without the image or message - the recipient knows it is not legitimate.
Denial of Service (DoS)
Sign in Seal
Buffer Overflow
Fraud and related activity in connection with computers
5. A virus that plants itself in a system's boot sector and infects the master boot record.
scope creep
DNS
Boot Sector Virus
packet filtering
6. A unique numerical string - created by a hashing algorithm on a given piece of data - used to verify data integrity. Generally hashes are used to verify the integrity of files after download (comparison to the hash value on the site before download)
hash
Domain Name System (DNS) lookup
Administratively Prohibited
Smurf attack
7. A wireless LAN security standard developed by IEEE. Requires Temporal Key Integrity Protocol (TKIP) and Advanced Encryption Standard (AES).
802.11 i
rule-based access control
DNS
Cryptography
8. A penetration test in which the ethical hacker has limited knowledge of the intended target(s). Designed to simulate an internal - but non-systemadministrator-level attack.
gray box testing
Target Of Engagement (TOE)
Timestamping
Collision
9. A group of people - gathered together by a business entity - working to address a specific problem or goal.
hash
White Box Testing
gateway
Tiger Team
10. A type of encryption where the same key is used to encrypt and decrypt the message.
SNMP
Warm Site
symmetric algorithm
symmetric encryption
11. A method of external testing whereby several systems or resources are used together to effect an attack.
Information Technology (IT) infrastructure
Daisy Chaining
File Transfer Protocol (FTP)
SID
12. A file system used by the Mac OS.
Hierarchical File System (HFS)
Audit Data
patch
Ethical Hacker
13. Port 389
role-based access control
fully qualified domain name (FQDN)
Interior Gateway Protocol (IGP)
LDAP
14. A portion of memory used to temporarily store output or input data.
-PM
Buffer
Authorization
phishing
15. Steps taken to identify and limit risks to an acceptable or reasonable level of exposure.
Hacks with permission
Due Diligence
SSH
Secure Multipurpose Mail Extension (S/MIME)
16. A computer security expert who performs security audits and penetration tests against systems or network segments - with the owner's full knowledge and permission - in an effort to increase security.
Web Spider
Availability
rogue access point
Ethical Hacker
17. A VPN tunneling protocol with encryption. PPTP connects two nodes in a VPN by using one TCP port for negotiation and authentication and one IP protocol for data transfer.
intrusion detection system (IDS)
Point-to-Point Tunneling Protocol (PPTP)
ring topology
Unicode
18. The public portion of an asymmetric key pair typically used to encrypt data or verify signatures. Public keys are shared and are used to encrypt messages.
Last In First Out (LIFO)
Certificate Authority (CA)
hot site
public key
19. Content Addressable Memory table. Holds all the MAC-address-to-port mappings on a switch.
Discretionary Access Control (DAC)
Vulnerability
CAM table
Tunneling
20. In computer security - this is an algorithm that uses separate keys for encryption and decryption.
Fiber Distributed Data Interface (FDDI)
Whois
Asymmetric Algorithm
symmetric encryption
21. As an identification device becomes more sensitive or accurate - its FAR decreases while its FRR increases. The CER is the point at which these two rates are equal - or cross over.
Overwhelm CAM table to convert switch to hub mode
A R
false rejection rate (FRR)
NetBSD
22. Safeguards or countermeasures to avoid - counteract - or minimize security risks.
security controls
Web Spider
Third Party
Banner Grabbing
23. Originally an extension of PPP - this is a protocol for authentication used within wireless networks. Works with multiple authentication measures.
Port Address Translation (PAT)
Filter
Extensible Authentication Protocol (EAP)
-sF
24. A type of denial-of-service attack where a hacker sends thousands of SYN packets to the target with spoofed IP addresses.
Internal access to the network
SYN attack
Vulnerability
Bluetooth
25. A computer system that performs tasks dictated by an attacker from a remote location. Zombies may be active or idle - and owners of the systems generally do not know their systems are compromised.
Extensible Authentication Protocol (EAP)
Zombie
-oG
Secure Multipurpose Mail Extension (S/MIME)
26. The process of systematically testing each port on a firewall to map rules and determine accessible ports.
gray box testing
-oX
firewalking
Hypertext Transfer Protocol (HTTP)
27. A collection of historical records or the place where they are kept. In computing - an archive generally refers to backup copies of logs and/or data.
protocol
role-based access control
Archive
Temporal Key Integrity Protocol (TKIP)
28. Controlling access to a network by analyzing the headers of incoming and outgoing packets - and letting them pass or discarding them based on rule sets created by a network administrator. A packet filter allows or denies packets based on destination
packet filtering
SOA record
Internet Control Message Protocol (ICMP)
Secure Sockets Layer (SSL)
29. A business - government agency - or educational institution that provides access to the Internet.
impersonation
Hierarchical File System (HFS)
Zone transfer
Internet service provider (ISP)
30. The potential for damage to or loss of an IT asset
patch
risk
Data Link layer
initial sequence number (ISN)
31. An Application layer protocol used primarily by Microsoft Windows to provide shared access to printers - files - and serial ports. It also provides an authenticated interprocess communication mechanism.
Wide Area Network (WAN)
risk acceptance
Time To Live (TTL)
Common Internet File System/Server Message Block
32. An Application layer protocol - using TCP - for transporting files across an Internet connection. FTP transmits in clear text.
segment
Denial of Service (DoS)
File Transfer Protocol (FTP)
NOP
33. A network traffic management technique designed to allow applications to specify the route a packet will take to a destination - regardless of what the route tables between the two systems say.
passive attack
hybrid attack
source routing
R
34. Port 53
DNS
intrusion prevention system (IPS)
Electronic Code Book (ECB)
Filter
35. The exploitation of a security vulnerability
security breach or security incident
null session
limitation of liability and remedies
patch
36. In regard to hash algorithms - this occurs when two or more distinct inputs produce the same output.
Collision
Mandatory access control (MAC)
risk assessment
-PM
37. A standard developed to enable routers to exchange messages containing information about routes to reach subnets in the network.
Routing Protocol
Timestamping
Traceroute
ISO 17799
38. Polymorphic Virus
self encrypting
Internet Assigned Number Authority (IANA)
Corrective Controls
logic bomb
39. A tool that helps a company to compare its actual performance with its potential performance.
Electronic Code Book (ECB)
-sI
Hierarchical File System (HFS)
gap analysis
40. Vulnerability Scanning
ping sweep
sniffer
The automated process of proactively identifying vulnerabilities of computing systems present in a network
risk
41. The contents of a packet. A system attack requires the attacker to deliver a malicious payload that is acted upon and executed by the system.
Echo request
payload
protocol
reverse lookup; reverse DNS lookup
42. Aggressive scan timing
shoulder surfing
Wi-Fi Protected Access (WPA)
parallel scan & 300 sec timeout & 1.25 sec/probe
Bluejacking
43. An Internet Protocol Security (IPSec) header used to verify that the contents of a packet have not been modified while the packet was in transit.
Bastion host
Authentication Header (AH)
Active Directory (AD)
Domain Name
44. Port 31337
Decryption
risk assessment
security kernel
Back orifice
45. A string that represents the location of a web resource
network access server
Fraud and related activity in connection with computers
Uniform Resource Locator (URL)
logic bomb
46. Used for exchanging structured information - such as XML-based messages - in the implementation of web services
Wide Area Network (WAN)
Domain Name System (DNS) lookup
Simple Object Access Protocol (SOAP)
Hacks with permission
47. An attack with the goal of preventing authorized users from accessing services and preventing the normal operation of computers and networks.
Fraud and related activity in connection with computers
R
Denial of Service (DoS)
protocol
48. A means of restricting access to system resources based on the sensitivity (as represented by a label) of the information contained in the system resource and the formal authorization (that is - clearance) of users to access information of such sensi
Mandatory access control (MAC)
Availability
Access Control List (ACL)
Tiger Team
49. An attack where the hacker manipulates parameters within the URL string in hopes of modifying data.
Daisy Chaining
Tiger Team
parameter tampering
signature scanning
50. The set of all hardware - firmware - and/or software components critical to IT security. Bugs or vulnerabilities occurring inside the TCB might jeopardize the security properties of the entire system.
risk transference
Syslog
Trusted Computer Base (TCB)
Address Resolution Protocol (ARP) table