SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. ACK Scan
sniffer
role-based access control
-sA
stream cipher
2. In penetration testing - enumeration is the act of querying a device or network segment thoroughly and systematically for information.
DNS
enumeration
Interior Gateway Protocol (IGP)
Computer-Based Attack
3. Hex 29
Detective Controls
network operations center (NOC)
A series of messages sent by someone attempting to break into a computer to learn about the computer's network services.
U P F
4. A Unix-like computer operating system descending from the BSD. Open-BSD includes a number of security features absent or optional in other operating systems.
ECHO reply
Warm Site
OpenBSD
port redirection
5. Chronological record of system activities to enable the reconstruction and examination of the sequence of events and changes in an event.
Threat
reverse lookup; reverse DNS lookup
Audit Data
Rijndael
6. A term trademarked by the Wi-Fi Alliance - used to define a standard for devices to use to connect to a wireless network.
iris scanner
Rijndael
Eavesdropping
Wi-Fi
7. The subjective - potential percentage of loss to a specific asset if a specific threat is realized. The exposure factor (EF) is a subjective value the person assessing risk must define.
Ciphertext
Exposure Factor
fully qualified domain name (FQDN)
Antivirus (AV) software
8. Name given to expert groups that handle computer security incidents.
-oA
Computer Emergency Response Team (CERT)
-sX
logic bomb
9. Steps taken to identify and limit risks to an acceptable or reasonable level of exposure.
Telnet
null session
Due Diligence
port knocking
10. An enumeration technique used to provide information about a computer system; generally used for operating system identification (also known as fingerprinting).
Banner Grabbing
Acceptable Use Policy (AUP)
forwarding
intranet
11. The level of importance assigned to an IT asset
firewalking
War Dialing
patch
Information Technology (IT) asset criticality
12. A fully qualified domain name consists of a host and domain name - including a top-level domain such as .com - .net - .mil - .edu -and so on.
fully qualified domain name (FQDN)
War Chalking
HTTP
SYN flood attack
13. An Application layer protocol - using TCP - for transporting files across an Internet connection. FTP transmits in clear text.
File Transfer Protocol (FTP)
Interior Gateway Protocol (IGP)
Routing Information Protocol (RIP)
Trusted Computer System Evaluation Criteria (TCSEC)
14. A unique hostname that is used to identify resources on the Internet. Domain names start with a root (.) - then add a top level (.com - .gov - or .mil - for example) - and a given name space.
nslookup
Domain Name
hash
fragmentation
15. Physical socket provided on routers and switches for cable connections between a computer and the router/switch. This connection enables the computer to configure - query - and troubleshoot the router/switch by use of a terminal emulator and a comman
Console Port
Zero Subnet
Confidentiality
NT LAN Manager (NTLM)
16. A section or subset of the network. Often a router or other routing device provides the end point of the segment.
network interface card (NIC)
segment
Active Fingerprinting
Address Resolution Protocol (ARP) table
17. NSA
Temporal Key Integrity Protocol (TKIP)
National Security Agency
LDAP
protocol stack
18. The set of all hardware - firmware - and/or software components critical to IT security. Bugs or vulnerabilities occurring inside the TCB might jeopardize the security properties of the entire system.
Computer Emergency Response Team (CERT)
Cache
Eavesdropping
Trusted Computer Base (TCB)
19. Hex 10
Auditing
A
POP 3
NOP
20. An evaluation consisting of a document review - interviews - and demonstrations. No hands-on testing is performed.
Level I assessment
ECHO reply
Presentation layer
802.11 i
21. A device providing temporary - on-demand - point-to-point network access to users.
network access server
queue
-b
signature scanning
22. An evaluation consisting of a document review - interviews - and demonstrations - as well as vulnerability scans and hands-on testing.
network access server
parallel scan
Level II assessment
Domain Name System (DNS)
23. Idlescan
Multipurpose Internet Mail Extensions (MIME)
-sI
-P0
serialize scans & 15 sec wait
24. The process of attaching a particular protocol header and trailer to a unit of data before transmission on the network. Occurs at layer 2 of the OSI reference model.
scope creep
Methodology
encapsulation
Password Authentication Protocol (PAP)
25. The monetary value expected from the occurrence of a risk on an asset. It is mathematically expressed as single loss expectancy (SLE) = asset value (AV)
single loss expectancy (SLE)
Bug
symmetric algorithm
physical security
26. The act of using numerous electronic serial numbers on a cell phone until a valid number is located.
risk transference
Tumbling
Internet Protocol (IP)
Exposure Factor
27. FTP Bounce Attack
CIA triangle
-b
Availability
S
28. A set of related communications protocols operating together as a group to address communication at some or all of the seven layers of the OSI reference model.
Internet Control Message Protocol (ICMP)
human-based social engineering
protocol stack
EDGAR database
29. CAN-SPAM
Tunneling
Defines legal email marketing
Lightweight Directory Access Protocol (LDAP)
stream cipher
30. Hex 04
Droppers
Audit Data
Fraud and related activity in connection with computers
R
31. A brand name of analog scrambling and de-scrambling equipment for cable and satellite television - invented primarily to keep consumer Television receive-only (TVRO) satellite equipment from receiving TV programming except on a subscription basis.
-P0
source routing
Ethical Hacker
Videocipher II Satellite Encryption System
32. Occurs when authorized users accumulate excess privileges on a system due to moving from position to position.
footprinting
Transmission Control Protocol (TCP)
hybrid attack
Access Creep
33. A principle in security engineering that attempts to use anonymity and secrecy (of design - implementation - and so on) to provide security; the footprint of the organization - entity - network - or system is kept as small as possible to avoid intere
security by obscurity
replay attack
Local Administrator
Trusted Computer Base (TCB)
34. A standard for encrypting e-mail - web pages - and other stream-oriented information transmitted over the Internet.
Computer-Based Attack
Fast Ethernet
Transport Layer Security (TLS)
replay attack
35. The directory service created by Microsoft for use on itsnetworks. Provides a variety of network services using Lightweight Directory Access Protocol (LDAP) - Kerberos-based authentication - and single sign-on for user access to network-based resourc
Active Directory (AD)
Redundant Array of Independent Disks (RAID)
risk assessment
-sO
36. A method of evaluating the security of a computer system or network by simulating an attack from a malicious source.
Virus
intranet
MAC filtering
penetration testing
37. A cell phone attack in which the serial number from one cell phone is copied to another in an effort to copy the cell phone.
End User Licensing Agreement (EULA)
S
LDAP
Cloning
38. A type 0 ICMP message used to reply to ECHO requests. Used with ping to verify network layer connectivity between hosts.
ECHO reply
Network Basic Input/Output System (NetBIOS)
Discretionary Access Control (DAC)
-oX
39. An application that monitors a computer or network to identify - and prevent - malware. AV is usually signature-based - and can take multiple actions on defined malware files/activity.
-P0
Antivirus (AV) software
SSH
Copyright
40. A denial-of-service technique that uses numerous hosts to perform the attack.
Distributed DoS (DDoS)
Eavesdropping
NT LAN Manager (NTLM)
SAM
41. The transmission of digital signals without precise clocking or synchronization.
Assessment
Zenmap
asynchronous transmission
Information Technology (IT) asset criticality
42. Ping Scan
A S
Level II assessment
operating system attack
-sP
43. ICMP Type/Code 3
-sX
Wired Equivalent Privacy (WEP)
SSH
Destination Unreachable
44. Recording the time - normally in a log file - when an event happens or when information is created or modified.
false negative
Timestamping
Computer Emergency Response Team (CERT)
GET
45. Evaluation in which testers attempt to penetrate the network.
-P0
TACACS
Level III assessment
Tiger Team
46. A program designed to browse websites in an automated - methodical manner. Sometimes these programs are used to harvest information from websites - such as e-mail addresses.
encapsulation
Replacing numbers in a url to access other files
Web Spider
Routing Information Protocol (RIP)
47. Controlling access to a network by analyzing the headers of incoming and outgoing packets - and letting them pass or discarding them based on rule sets created by a network administrator. A packet filter allows or denies packets based on destination
Boot Sector Virus
net use \[target ip]IPC$ '' /user:''
packet filtering
session splicing
48. A well-known and studied phenomenon of human nature - whereby a single trait influences the perception of other traits.
gray box testing
halo effect
International Organization for Standardization (ISO)
Client
49. The process of pinging each address within a subnet to map potential targets. Ping sweeps are unreliable and easily detectable - but very fast.
Fast Ethernet
Droppers
ping sweep
Echo request
50. Formal description and evaluation of the vulnerabilities in an information system
NOP
Vulnerability Assessment
Denial of Service (DoS)
Trojan Horse
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests