SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A social-engineering attack using computer resources - such as e-mail or IRC.
Computer-Based Attack
White Box Testing
Corrective Controls
XOR Operation
2. A communications path - such as the Internet - authorized for data transmission within a computer system or network.
-oA
overt channel
Fiber Distributed Data Interface (FDDI)
red team
3. A network administration command-line tool available for many operating systems for querying the Domain Name System (DNS) to obtain domain name or IP address mappings or any other specific DNS record.
Cookie
Asynchronous
nslookup
Backdoor
4. Vulnerability Scanning
The automated process of proactively identifying vulnerabilities of computing systems present in a network
gateway
Uniform Resource Locator (URL)
open source
5. A virus designed to infect the master boot record.
Master boot record infector
sidejacking
SID
port knocking
6. Hex 10
Filter
Block Cipher
Cracker
A
7. Baseband LAN specification developed by Xerox Corporation - Intel - and Digital Equipment Corporation. One of the least expensive - most widely deployed networking standards; uses the CSMA/CD method of media access control.
Vulnerability
Electronic Code Book (ECB)
Ethernet
session splicing
8. A trusted entity that issues and revokes public key certificates. In a network - a CA is a trusted entity that issues - manages - and revokes security credentials and public keys for message encryption and/or authentication. Within a public key infra
Certificate Authority (CA)
Possession of access devices
Application Layer
Macro virus
9. ICMP Type/Code 8
TACACS
Audit Trail
Echo request
Brute-Force Password Attack
10. A storage buffer that transparently stores data so future requests for the same data can be served faster.
False Acceptance Rate (FAR)
sniffer
spoofing
Cache
11. An anonymous connection to an administrative share (IPC$) on a Windows machine. Null sessions allow for enumeration of Windows machines - among other attacks.
null session
payload
Audit Trail
Access Creep
12. Weakness in an information system - system security procedures - internal controls - or implementation that could be exploited or triggered by a threat source.
risk acceptance
Vulnerability
qualitative analysis
-sP
13. A penetration test in which the ethical hacker has limited knowledge of the intended target(s). Designed to simulate an internal - but non-systemadministrator-level attack.
gray box testing
Asynchronous
Institute of Electrical and Electronics Engineers (IEEE)
session splicing
14. A point of reference used to mark an initial state in order to manage change.
Baseline
initial sequence number (ISN)
session hijacking
stateful packet filtering
15. Any circumstance or event with the potential to adversely impact organizationaloperations - organizational assets - or individuals through an information system via unauthorized access - destruction - disclosure - modification of information - and/or
Daemon
Threat
End User Licensing Agreement (EULA)
FTP
16. A collection of historical records or the place where they are kept. In computing - an archive generally refers to backup copies of logs and/or data.
Time exceeded
Access Point (AP)
Archive
Tini
17. A nontechnical method of hacking. Social engineering is the art of manipulating people - whether in person (human-based) or via computing methods (computer-based) - into providing sensitive information.
Telnet
Competitive Intelligence
R
social engineering
18. A formal set of rules describing data transmission - especially across a network. A protocol determines the type of error checking - the data compression method - how the sending device will indicate completion - how the receiving device will indicat
Buffer Overflow
protocol
spyware
-PI
19. An early network application that provides information on users currently logged on to a machine.
--randomize_hosts -O OS fingerprinting
Wi-Fi
Finger
out-of-band signaling
20. An extensible mechanism for e-mail. A variety of MIME types exist for sending content such as audio - binary - or video using the Simple Mail Transfer Protocol (SMTP).
Multipurpose Internet Mail Extensions (MIME)
Service Set Identifier (SSID)
piggybacking
Uniform Resource Locator (URL)
21. A card with a built-in microprocessor and memory used for identification or financial transactions. The card transfers data to and from a central computer when inserted into a reader.
false rejection rate (FRR)
spam
smart card
White Box Testing
22. Network Scanning
Time To Live (TTL)
Target Of Engagement (TOE)
A procedure for identifying active hosts on a network.
Fast Ethernet
23. Part of a service contract where the level of service is formally defined; may be required as part of the initial pen test agreements.
service level agreements (SLAs)
Asymmetric
Overwhelm CAM table to convert switch to hub mode
DNS
24. A device that receives and sends data packets between two or more networks; the packet headers and a forwarding table provide the router with the information necessary for deciding which interface to use to forward packets.
piggybacking
RID Resource identifier
TACACS
router
25. A wireless access point that has either been installed on a secure company network without explicit authorization from a local network administrator - or has been created to allow a hacker to conduct a man-in-the-middle attack.
Network Basic Input/Output System (NetBIOS)
rogue access point
Pretty Good Privacy (PGP)
hot site
26. Used to find the domain name associated with an IP address; the opposite of a DNS lookup.
false rejection rate (FRR)
reverse lookup; reverse DNS lookup
Daemon
proxy server
27. Manipulating a search string with additional specific operators to search for vulnerabilities or very specific information.
Virtual Local Area Network (VLAN)
Possession of access devices
Google hacking
Asynchronous
28. Physical socket provided on routers and switches for cable connections between a computer and the router/switch. This connection enables the computer to configure - query - and troubleshoot the router/switch by use of a terminal emulator and a comman
operating system attack
War Chalking
Warm Site
Console Port
29. A unique numerical string - created by a hashing algorithm on a given piece of data - used to verify data integrity. Generally hashes are used to verify the integrity of files after download (comparison to the hash value on the site before download)
hash
service level agreements (SLAs)
serialize scans & 0.4 sec wait
NetBSD
30. Also known as a public key certificate - this is an electronic file that is used to verify a user's identity - providing non-repudiation throughout the sys-tem. Certificates contain the entity's public key - serial number - version - subject - algori
Digital Certificate
Whois
HTTP tunneling
Tunneling
31. LM Hash for short passwords (under 7)
404EE
Internet Protocol Security (IPSec) architecture
Asset
Telnet
32. Created by the U.S. Federal Communications Commission to uniquely identify mobile devices; often represented as an 11-digit decimal number or eight-digit hexadecimal number.
-PI
Secure Multipurpose Mail Extension (S/MIME)
Electronic serial number
penetration testing
33. Safeguards or countermeasures to avoid - counteract - or minimize security risks.
DNS enumeration
Temporal Key Integrity Protocol (TKIP)
Authentication Header (AH)
security controls
34. A security tool designed to protect a system or network against attacks by comparing traffic patterns against a list of both known attack signatures and general characteristics of how attacks may be carried out. Threats are rated and protective measu
sidejacking
A procedure for identifying active hosts on a network.
security incident response team (SIRT)
intrusion prevention system (IPS)
35. A method used to prevent IDS detection by dividing the request into multiple parts that are sent in different packets
session splicing
steganography
Hacks with permission
SID
36. A unique hostname that is used to identify resources on the Internet. Domain names start with a root (.) - then add a top level (.com - .gov - or .mil - for example) - and a given name space.
Domain Name
S
Password Authentication Protocol (PAP)
site survey
37. In regard to hash algorithms - this occurs when two or more distinct inputs produce the same output.
Temporal Key Integrity Protocol (TKIP)
intranet
physical security
Collision
38. The combination of all IT assets - resources - components - and systems.
-sW
Bluesnarfing
Information Technology (IT) infrastructure
-b
39. A command used in HTTP and FTP to retrieve a file from a server.
Asymmetric
GET
War Dialing
intrusion detection system (IDS)
40. An organized collection of data.
reconnaissance
intrusion detection system (IDS)
Database
Data Link layer
41. A term trademarked by the Wi-Fi Alliance - used to define a standard for devices to use to connect to a wireless network.
RID Resource identifier
Wi-Fi
Ciphertext
port redirection
42. A wireless networking mode where all clients connect to the wireless network through a central access point.
infrastructure mode
Due Care
Smurf attack
Active Directory (AD)
43. Method used by antivirus software to detect new - unknown viruses that have not yet been identified; based on a piece-by-piece examination of a program - looking for a sequence or sequences of instructions that differentiate the virus from 'normal' p
heuristic scanning
key exchange protocol
Simple Mail Transfer Protocol (SMTP)
Audit Data
44. The rate at which a biometric system will incorrectly reject an access attempt by an authorized user.
local area network (LAN)
rogue access point
false rejection rate (FRR)
Daisy Chaining
45. A fully qualified domain name consists of a host and domain name - including a top-level domain such as .com - .net - .mil - .edu -and so on.
Minimum acceptable level of risk
-PS
HTTP tunneling
fully qualified domain name (FQDN)
46. A document describing information security guidelines - policies - procedures - and standards.
Information Technology (IT) security architecture and framework
Telnet
key exchange protocol
802.11 i
47. An encryption standard designed by Joan Daemen and Vincent Rijmen. Chosen by a NIST contest to be the Advanced Encryption Standard (AES).
File Allocation Table (FAT)
-sS
Rijndael
port redirection
48. Attacks that take advantage of the built-in code and scripts most off-the-shelf applications come with.
parallel scan & 75 sec timeout & 0.3 sec/probe
stateful packet filtering
Cryptographic Key
shrink-wrap code attacks
49. A device that provides access between two or more networks. Gateways are typically used to connect dissimilar networks.
Network Address Translation (NAT)
gateway
rule-based access control
Back orifice
50. The process of systematically testing each port on a firewall to map rules and determine accessible ports.
firewalking
-PS
CNAME record
Transport Layer Security (TLS)
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests