SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. PI and PT Ping
logic bomb
-PB
Covert Channel
No previous knowledge of the network
2. A data encryption/decryption program often used for e-mail and file storage.
fully qualified domain name (FQDN)
Pretty Good Privacy (PGP)
reconnaissance
Cryptography
3. The process of transforming ciphertext into plaintext through the use of a cryptographic algorithm.
U P F
Decryption
parallel scan & 75 sec timeout & 0.3 sec/probe
Confidentiality
4. A mode of operation in a wireless LAN in which clients send data directly to one another without utilizing a wireless access point (WAP) - much like a point-to-point wired connection.
Competitive Intelligence
Application Layer
gray hat
ad hoc mode
5. A defined measure of service within a network system
Last In First Out (LIFO)
network interface card (NIC)
quality of service (QoS)
sheepdip
6. UDP Scan
encryption
John the Ripper - LOphtcrack - Ophtcrack - Cain and Abel
passive attack
-sU
7. A social-engineering attack that manipulates the victim into calling the attacker for help.
404EE
human-based social engineering
net use \[target ip]IPC$ '' /user:''
reverse social engineering
8. Policy stating what users of a system can and cannot do with the organization's assets.
Defines legal email marketing
Acceptable Use Policy (AUP)
Brute-Force Password Attack
Vulnerability
9. Controlling access to a network by analyzing the headers of incoming and outgoing packets - and letting them pass or discarding them based on rule sets created by a network administrator. A packet filter allows or denies packets based on destination
Tunnel
Domain Name System (DNS)
packet filtering
Extensible Authentication Protocol (EAP)
10. A programming principle whereby the last piece of data added to the stack is the first piece of data taken off.
intranet
Blowfish
Wi-Fi Protected Access (WPA)
Last In First Out (LIFO)
11. The act of using numerous electronic serial numbers on a cell phone until a valid number is located.
false rejection rate (FRR)
Tumbling
quality of service (QoS)
Wireless Local Area Network (WLAN)
12. A value used to control cryptographic operations - such as decryption -encryption - signature generation - and signature verification.
parallel scan
Cryptographic Key
Audit Data
Directory Traversal
13. Set of tools (applications or code) that enables administrator-level accessto a computer or computer network and is designed to obscure the fact that the system has been compromised. Rootkits are dangerous malware entities that provide administrator
Simple Mail Transfer Protocol (SMTP)
footprinting
inference attack
rootkit
14. Wireless LAN standards created by IEEE. 802.11a runs at up to 54Mbps at 5GHz - 802.11b runs at 11Mbps at 2.4GHz - 802.11g runs at 54Mbps at 2.4GHz - and 802.11n can run upwards of 150MBps.
SOA record
Secure Multipurpose Mail Extension (S/MIME)
802.11
infrastructure mode
15. An adapter that provides the physical connection to send and receive data between the computer and the network media.
Institute of Electrical and Electronics Engineers (IEEE)
sidejacking
network interface card (NIC)
Routing Protocol
16. 18 U.S.C. 1030
FreeBSD
Fraud and related activity in connection with computers
serialize scans & 15 sec wait
single loss expectancy (SLE)
17. An authentication method on point-to-point links - using a three-way handshake and a mutually agreed-upon key.
Challenge Handshake Authentication Protocol (CHAP)
Multipurpose Internet Mail Extensions (MIME)
Wi-Fi
Trusted Computer System Evaluation Criteria (TCSEC)
18. A device that provides access between two or more networks. Gateways are typically used to connect dissimilar networks.
separation of duties
National Security Agency
Hypertext Transfer Protocol (HTTP)
gateway
19. Idlescan
--randomize_hosts -O OS fingerprinting
Malicious code
-sI
Asymmetric
20. Used to find the domain name associated with an IP address; the opposite of a DNS lookup.
Domain Name System (DNS) lookup
reverse lookup; reverse DNS lookup
session splicing
Vulnerability
21. FTP Bounce Attack
MAC filtering
halo effect
Computer Emergency Response Team (CERT)
-b
22. A unit of information formatted according to specific protocols that allows precise transmittal of data from one network node to another. Also called a datagram or data packet - a packet contains a header (container) and a payload (contents). Any IP
packet
Cookie
Detective Controls
Dumpster Diving
23. List Scan
Ethical Hacker
-sL
Master boot record infector
signature scanning
24. A security protocol for wireless local area networks defined in the 802.11b standard; intended to provide the same level of security as a wired LAN. WEP is not considered strong security - although it does authenticate clients to access points - encr
National Security Agency
Time To Live (TTL)
Wired Equivalent Privacy (WEP)
Covert Channel
25. The result of using a private key to encrypt a hash value for identification purposes within a PKI system. The signature can be decoded by the originator's public key - verifying his identity and providing non-repudiation. A valid digital signature g
-PB
Cracker
Digital Signature
Daisy Chaining
26. A number assigned during TCP startup sessions that tracks how much information has been moved. This number is used by hackers when hijacking sessions.
Crossover Error Rate (CER)
initial sequence number (ISN)
open source
keylogger
27. A type of denial-of-service attack where a hacker sends thousands of SYN packets to the target with spoofed IP addresses.
Distributed DoS (DDoS)
CIA triangle
impersonation
SYN attack
28. An attack where the hacker repeats a portion of a cryptographic exchange in hopes of fooling the system into setting up a communications channel.
replay attack
Availability
Backdoor
suicide hacker
29. A type of DNS transfer - where all records from an SOA are transmitted to the requestor. Zone transfers have two options: full (opcode AXFR) and incremental (IXFR).
segment
quality of service (QoS)
Zone transfer
Asynchronous
30. A wireless LAN device that acts as a central point for all wireless traffic. The AP is connected to both the wireless LAN and the wired LAN - providing wireless clients access to network resources.
Access Point (AP)
Presentation layer
404EE
script kiddie
31. RPC Scan
Computer-Based Attack
quality of service (QoS)
-sR
Hacks without permission
32. Confidentiality - Integrity - and Availability are the three aspects of security and make up the triangle.
Due Care
CIA triangle
Asymmetric Algorithm
Bluejacking
33. A communications path - such as the Internet - authorized for data transmission within a computer system or network.
DNS
ad hoc mode
-sI
overt channel
34. NSA
Tunnel
session hijacking
firewalking
National Security Agency
35. The art and science of creating a covert message or image within another message - image - audio - or video file.
steganography
War Chalking
Time exceeded
Active Attack
36. Provides data encryption for IEEE 802.11 wireless networks so data can only be decrypted by the intended recipients.
Routing Information Protocol (RIP)
Corrective Controls
Wi-Fi
Wi-Fi Protected Access (WPA)
37. An extensible mechanism for e-mail. A variety of MIME types exist for sending content such as audio - binary - or video using the Simple Mail Transfer Protocol (SMTP).
Multipurpose Internet Mail Extensions (MIME)
Antivirus (AV) software
sheepdip
Information Technology Security Evaluation Criteria (ITSEC)
38. Controls internal to a system designed to resolve vulnerabilities and errors soon after they arise.
role-based access control
Post Office Protocol 3 (POP3)
Corrective Controls
802.11 i
39. A protocol that allows a client computer to request services from a server and the server to return the results.
Pretty Good Privacy (PGP)
security by obscurity
A procedure for identifying active hosts on a network.
remote procedure call (RPC)
40. Self-contained network with a limited number of participants who extend limited trust to one another in order to accomplish an agreed-upon goal.
intranet
Master boot record infector
A
Active Fingerprinting
41. Nmap grepable output
-oG
Point-to-Point Tunneling Protocol (PPTP)
False Acceptance Rate (FAR)
out-of-band signaling
42. Transmission using channels or frequencies outside those normally used for data transfer; often used for error reporting.
heuristic scanning
Bug
out-of-band signaling
-oN
43. Cracking Tools
Antivirus (AV) software
John the Ripper - LOphtcrack - Ophtcrack - Cain and Abel
Virtual Private Network (VPN)
CNAME record
44. don't ping
Routing Information Protocol (RIP)
MD5
-P0
reverse social engineering
45. ICMP Type/Code 11
Distributed DoS (DDoS)
Time exceeded
Reconnaissance - Scanning - Gaining Access - Maintaining Access - Covering Tracks
script kiddie
46. A method of permitting only MAC addresses in a preapproved list network access. Addresses not matching are blocked.
identity theft
MAC filtering
Information Technology (IT) infrastructure
Data Encryption Standard (DES)
47. Host-based IDS. An IDS that resides on the host - protecting against file and folder manipulation and other host-based attacks and actions.
Kerberos
serialize scans & 0.4 sec wait
HIDS
Due Care
48. A systematic process for the assessment of security vulnerabilities.
Application-Level Attacks
INFOSEC Assessment Methodology (IAM)
gray box testing
-PS
49. Sending unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobile phones - PDAs - or laptop computers.
Console Port
Bluejacking
Information Technology (IT) asset criticality
Common Internet File System/Server Message Block
50. The steps taken to gather evidence and information on the targets you wish to attack.
false rejection rate (FRR)
reconnaissance
War Chalking
-PT