SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Provides router-to-router or host-to-network connections over asynchronous and synchronous circuits.
Point-to-Point Protocol (PPP)
Adware
Open System Interconnection (OSI) Reference Model
network interface card (NIC)
2. A structured set of criteria for evaluating computer security within products and systems produced by European countries; it has been largely replaced by the Common Criteria.
-sA
Information Technology Security Evaluation Criteria (ITSEC)
Hypertext Transfer Protocol (HTTP)
Telnet
3. Traffic-passing technique used by bridges and switches in which traffic received on an interface is sent out all interfaces on the device except the interface on which the information was originally received. Traffic on a switch is flooded when it is
Time exceeded
Lightweight Directory Access Protocol (LDAP)
flood
Telnet
4. The security property that data is not modified in an unauthorized and undetected manner. Also - the principle and measures taken to ensure that data received is in the exact same condition and state as when it was originally transmitted.
Tunneling
Digital Certificate
Open System Interconnection (OSI) Reference Model
integrity
5. A person or entity indirectly involved in a relationship between two principles.
serial scan & 300 sec wait
Biometrics
packet filtering
Third Party
6. A social-engineering attack that manipulates the victim into calling the attacker for help.
operating system attack
fully qualified domain name (FQDN)
Wi-Fi
reverse social engineering
7. A software program for remotely controlling a Microsoft Windows computer system over a network. Generally considered malware.
Console Port
NetBus
flood
Presentation layer
8. Actions - devices - procedures - techniques - or other measures intended to reduce the vulnerability of an information system.
Countermeasures
Adware
Media Access Control (MAC)
Vulnerability Management
9. Malware designed to install some sort of virus - backdoor - and so on - on a target system.
non-repudiation
social engineering
Droppers
gray box testing
10. A network architecture framework developed by ISO that describes the communications process between two systems across the Internet in seven distinct layers.
HTTP
risk acceptance
reverse social engineering
Open System Interconnection (OSI) Reference Model
11. A type 0 ICMP message used to reply to ECHO requests. Used with ping to verify network layer connectivity between hosts.
MD5
ECHO reply
Self Replicating
Serial Line Internet Protocol (SLIP)
12. A set of rules defined to screen network packets based on source address - destination address - or protocol; these rules determine whether the packet will be forwarded or discarded.
Simple Mail Transfer Protocol (SMTP)
out-of-band signaling
Filter
-PI
13. The ability to trace actions performed on a system to a specific user or system entity.
spoofing
Master boot record infector
Accountability
qualitative analysis
14. Also known as a public key certificate - this is an electronic file that is used to verify a user's identity - providing non-repudiation throughout the sys-tem. Certificates contain the entity's public key - serial number - version - subject - algori
MAC filtering
Digital Certificate
Auditing
Collision
15. A method of external testing whereby several systems or resources are used together to effect an attack.
Daisy Chaining
Possession of access devices
Destination Unreachable
spyware
16. The monetary value assigned to an IT asset.
Information Technology (IT) asset valuation
Web Spider
Availability
node
17. A command used in HTTP and FTP to retrieve a file from a server.
Web Spider
User Datagram Protocol (UDP)
GET
Domain Name System (DNS) cache poisoning
18. A physical security attack where the attacker sifts through garbage and recycle bins for information that may be useful on current and future attacks
private key
honeynet
Dumpster Diving
Information Technology (IT) security architecture and framework
19. A backlog of packets stored in buffers and waiting to be forwarded over an interface.
queue
infrastructure mode
MD5
EDGAR database
20. Any network incident that prompts some kind of log entry or other notification.
Event
symmetric encryption
Secure Multipurpose Mail Extension (S/MIME)
role-based access control
21. Software code - a portion of data - or sequence of commands intended to take advantage of a bug or vulnerability in order to cause unintended or unanticipated behavior to occur on computer software or hardware.
Cloning
Exploit
Asymmetric
War Dialing
22. LAN standard - defined by ANSI X3T9.5 - specifying a 100Mbps token-passing network using fiber-optic cable and a dualring architecture for redundancy - with transmission distances of up to two kilometers.
Vulnerability Management
Mandatory access control (MAC)
INFOSEC Assessment Methodology (IAM)
Fiber Distributed Data Interface (FDDI)
23. LM Hash for short passwords (under 7)
Backdoor
Back orifice
out-of-band signaling
404EE
24. A value used to control cryptographic operations - such as decryption -encryption - signature generation - and signature verification.
public key infrastructure (PKI)
Cryptographic Key
Hypertext Transfer Protocol (HTTP)
halo effect
25. Freely and readily available information on an organization that can be gathered by a business entity about its competitor's customers - products - and marketing - and can be used by an attacker to build useful information for further attacks.
Address Resolution Protocol (ARP)
Whois
Competitive Intelligence
-sA
26. An informed decision to accept the potential for damage to or loss of an IT asset.
Cracker
Self Replicating
risk acceptance
serialize scans & 0.4 sec wait
27. A text file stored within a browser by a web server that maintains information about the connection. Cookies are used to store information to maintain a unique but consistent surfing experience - but can also contain authentication parameters. Cookie
Tunneling
Trapdoor Function
Cookie
gray box testing
28. The act or actions of a hacker to put forward a cause or a political agenda - to affect some societal change - or to shed light on something he feels to be political injustice. These activities are usually illegal in nature.
personal identification number (PIN)
R
hacktivism
Minimum acceptable level of risk
29. A method of falsely identifying the source of data packets; often used by hackers to make it difficult to trace where an attack originated.
Droppers
Overwhelm CAM table to convert switch to hub mode
spoofing
Interior Gateway Protocol (IGP)
30. A computer security expert who performs security audits and penetration tests against systems or network segments - with the owner's full knowledge and permission - in an effort to increase security.
red team
Timestamping
Ethical Hacker
CAM table
31. A small Trojan program that listens on port 777.
network interface card (NIC)
Tini
-sO
No previous knowledge of the network
32. A program or piece of code inserted into a system - usually covertly - with the intent of compromising the confidentiality - integrity - or availability of the victim's data - applications - or operating system. Malware consists of viruses - worms -
Application-Level Attacks
Malware
Ethernet
Echo request
33. Cracking Tools
SAM
spyware
John the Ripper - LOphtcrack - Ophtcrack - Cain and Abel
Antivirus (AV) software
34. A standard for encrypting and authenticating MIME data; used primarily for Internet e-mail.
Secure Multipurpose Mail Extension (S/MIME)
intrusion detection system (IDS)
Application Layer
-sS
35. Microsoft SID 500
Bit Flipping
Mandatory access control (MAC)
Local Administrator
HTTP
36. nmap all output
Real application encompassing Trojan
Tumbling
polymorphic virus
-oA
37. A domain composed of all the systems sharing any given physical transport media. Systems within a collision domain may collide with each other during the transmission of data. Collisions can be managed by CSMA/CD (collision detection) or CSMA/CA (col
RID Resource identifier
War Driving
Pretty Good Privacy (PGP)
Collision Domain
38. One or more locations from which control is exercised over a computer - television broadcast - or telecommunications network.
network operations center (NOC)
Domain Name System (DNS) lookup
suicide hacker
route
39. Ports 20/21
-oG
Packet Internet Groper (ping)
Domain Name
FTP
40. Paranoid scan timing
Replacing numbers in a url to access other files
serial scan & 300 sec wait
Wireless Local Area Network (WLAN)
symmetric encryption
41. FIN Scan
Electronic serial number
-sF
Copyright
NetBus
42. Conversion of plaintext to ciphertext through the use of a cryptographic algorithm.
Serial Line Internet Protocol (SLIP)
signature scanning
encryption
Transport Layer Security (TLS)
43. The act of using numerous electronic serial numbers on a cell phone until a valid number is located.
Last In First Out (LIFO)
Tumbling
Exploit
remote procedure call (RPC)
44. Created by the U.S. Federal Communications Commission to uniquely identify mobile devices; often represented as an 11-digit decimal number or eight-digit hexadecimal number.
Trapdoor Function
Digital Watermarking
Network Address Translation (NAT)
Electronic serial number
45. An approach to restricting system access to authorized users in which roles are created for various job functions. The permissions to perform certain operations are assigned to specific roles. Members of staff (or other system users) are assigned par
Point-to-Point Protocol (PPP)
Finding a directory listing and gaining access to a parent or root file for access to other files
Last In First Out (LIFO)
role-based access control
46. The software product or system that is the subject of an evaluation.
Availability
Web Spider
protocol
Target Of Engagement (TOE)
47. The subjective - potential percentage of loss to a specific asset if a specific threat is realized. The exposure factor (EF) is a subjective value the person assessing risk must define.
hardware keystroke logger
FreeBSD
Exposure Factor
asynchronous transmission
48. Used for exchanging structured information - such as XML-based messages - in the implementation of web services
Presentation layer
SNMP
Simple Object Access Protocol (SOAP)
network tap
49. 1. The path a packet travels to reach the intended destination. Each individual device along the path traveled is called a hop. 2. Information contained on a device containing instructions for reaching other nodes on the network. This information can
Third Party
firewalking
Zenmap
route
50. An evaluation consisting of a document review - interviews - and demonstrations - as well as vulnerability scans and hands-on testing.
red team
Level II assessment
-oG
Post Office Protocol 3 (POP3)
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests