SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A section or subset of the network. Often a router or other routing device provides the end point of the segment.
risk transference
Domain Name
segment
parallel scan & 300 sec timeout & 1.25 sec/probe
2. An attack against an authentication protocol in which the attacker intercepts data in transit along the network between the claimant and verifier - but does not alter the data (in other words - eavesdropping).
source routing
network access server
passive attack
Algorithm
3. A protocol defining packets that are able to be routed by a router.
Domain Name System (DNS) lookup
POST
local area network (LAN)
routed protocol
4. A step-by-step method of solving a problem. In computing security - an algorithm is a set of mathematical rules (logic) for the process of encryption and decryption
Algorithm
local area network (LAN)
File Allocation Table (FAT)
infrastructure mode
5. A mathematical operation requiring two binary inputs: If the inputs match - the output is a 0 - otherwise it is a 1.
XOR Operation
Community String
R
Availability
6. A method of network traffic filtering that monitors the entire communications process - including the originator of the session and from which direction it started.
Dumpster Diving
stateful packet filtering
NetBus
Cloning
7. A method of defining what rights and permissions an entity has to a given resource. In networking - Access Control Lists are commonly associated with firewall and router traffic filtering rules.
segment
Access Control List (ACL)
footprinting
pattern matching
8. Layer 2 of the OSI reference model. This layer provides reliable transit of data across a physical link. The Data Link layer is concerned with physical addressing - network topology - access to the network medium - error detection - sequential delive
remote procedure call (RPC)
Tini
quality of service (QoS)
Data Link layer
9. Nmap grepable output
Data Encryption Standard (DES)
Timestamping
Defense in Depth
-oG
10. Hex 29
qualitative analysis
Application-Level Attacks
smart card
U P F
11. A set of related communications protocols operating together as a group to address communication at some or all of the seven layers of the OSI reference model.
Domain Name System (DNS) lookup
protocol stack
personal identification number (PIN)
encapsulation
12. An e-mail protection method using a secret message or image that can be referenced on any official communication with the site; if an e-mail is received without the image or message - the recipient knows it is not legitimate.
Virus Hoax
polymorphic virus
No previous knowledge of the network
Sign in Seal
13. A means of exchanging information from one entity to another using a process that does not provide an attacker the opportunity to reorder - delete - insert - or read information.
-oN
secure channel
Bluetooth
Authentication - Authorization - and Accounting (AAA)
14. A U.S. Department of Defense (DoD) standard that sets basic requirements for assessing the effectiveness of computer security controls built into a computer system.
Trusted Computer System Evaluation Criteria (TCSEC)
Service Set Identifier (SSID)
Level I assessment
Authentication
15. An HTTP command to transmit text to a web server for processing. The opposite of an HTTP GET.
Distributed DoS (DDoS)
routed protocol
End User Licensing Agreement (EULA)
POST
16. The concept of having more than one person required to complete a task
separation of duties
RPC-DCOM
Certificate
Demilitarized Zone (DMZ)
17. A network traffic management technique designed to allow applications to specify the route a packet will take to a destination - regardless of what the route tables between the two systems say.
A procedure for identifying active hosts on a network.
source routing
Finding a directory listing and gaining access to a parent or root file for access to other files
NT LAN Manager (NTLM)
18. Access by information systems (or users) communicating from outside the information system security perimeter.
Time Bomb
Finding a directory listing and gaining access to a parent or root file for access to other files
pattern matching
remote access
19. A number assigned during TCP startup sessions that tracks how much information has been moved. This number is used by hackers when hijacking sessions.
Cookie
Hacks without permission
SYN flood attack
initial sequence number (ISN)
20. A skilled hacker that straddles the line between white hat (hacking only with permission and within guidelines) and black hat (malicious hacking for personal gain). Gray hats sometime perform illegal acts to exploit technology with the intent of achi
gray hat
Routing Information Protocol (RIP)
Bug
smart card
21. A stand-alone computer - kept off the network - that is used for scanning potentially malicious media or software.
-sW
Assessment
sheepdip
false negative
22. A domain composed of all the systems sharing any given physical transport media. Systems within a collision domain may collide with each other during the transmission of data. Collisions can be managed by CSMA/CD (collision detection) or CSMA/CA (col
Due Diligence
Unicode
Information Technology Security Evaluation Criteria (ITSEC)
Collision Domain
23. Safeguards or countermeasures to avoid - counteract - or minimize security risks.
Media Access Control (MAC)
Real application encompassing Trojan
security controls
Administratively Prohibited
24. Port 22
SSH
-oX
FTP
ring topology
25. A technology that establishes a tunnel to create a private - dedicated - leased-line network over the Internet. The data is encrypted so it's readable only by the sender and receiver. Companies commonly use VPNs to allow employees to connect securely
Virtual Private Network (VPN)
physical security
security defect
Digital Certificate
26. An evaluation consisting of a document review - interviews - and demonstrations. No hands-on testing is performed.
Level I assessment
Lightweight Directory Access Protocol (LDAP)
False Acceptance Rate (FAR)
Cookie
27. TCP connect() scan
Web Spider
-sT
Digital Certificate
honeypot
28. Terminal Access Controller Access-Control System. A remote authentication protocol that is used to communicate with an authentication server commonly used in Unix networks.
parallel scan
Possession of access devices
spyware
TACACS
29. A cryptographic attack where bits are manipulated in the ciphertext itself to generate a predictable outcome in the plaintext once it is decrypted.
Bit Flipping
Telnet
Banner Grabbing
Tunneling
30. Software used to bind a Trojan and a legitimate program together so the Trojan will be installed when the legitimate program is executed.
Replacing numbers in a url to access other files
nslookup
Wrapper
Ethernet
31. An attack where the hacker positions himself between the client and the server - to intercept (and sometimes alter) data traveling between the two.
Wi-Fi
promiscuous mode
-PS
Man-in-the-middle attack
32. A social-engineering attack that manipulates the victim into calling the attacker for help.
reverse social engineering
A
Corrective Controls
symmetric algorithm
33. The software product or system that is the subject of an evaluation.
A S
Access Point (AP)
Target Of Engagement (TOE)
-sT
34. A computer system that performs tasks dictated by an attacker from a remote location. Zombies may be active or idle - and owners of the systems generally do not know their systems are compromised.
Zombie
Level III assessment
false rejection rate (FRR)
Asymmetric Algorithm
35. A wireless LAN security standard developed by IEEE. Requires Temporal Key Integrity Protocol (TKIP) and Advanced Encryption Standard (AES).
Asymmetric
personal identification number (PIN)
802.11 i
infrastructure mode
36. A unique numerical string - created by a hashing algorithm on a given piece of data - used to verify data integrity. Generally hashes are used to verify the integrity of files after download (comparison to the hash value on the site before download)
War Driving
hash
node
parallel scan & 300 sec timeout & 1.25 sec/probe
37. Provides router-to-router or host-to-network connections over asynchronous and synchronous circuits.
Point-to-Point Protocol (PPP)
802.11 i
-sX
Tiger Team
38. An attack in which a hacker steps between two ends of an already-established communication session and uses specialized tools to guess sequence numbers to take over the channel.
RID Resource identifier
source routing
logic bomb
session hijacking
39. An outdated symmetric cipher encryption algorithm - previously U.S. government-approved and used by business and civilian government agencies. DES is no longer considered secure due to the ease with which the entire keyspace can be attempted using mo
Fraud and related activity in connection with computers
Cryptography
Data Encryption Standard (DES)
single loss expectancy (SLE)
40. As an identification device becomes more sensitive or accurate - its FAR decreases while its FRR increases. The CER is the point at which these two rates are equal - or cross over.
Worm
-sX
File Allocation Table (FAT)
false rejection rate (FRR)
41. An environmentally conditioned workspace partially equipped with IT and telecommunications equipment to support relocated IT operations in the event of a significant disruption.
Warm Site
open source
Annualized Loss Expectancy (ALE)
CNAME record
42. Baseband LAN specification developed by Xerox Corporation - Intel - and Digital Equipment Corporation. One of the least expensive - most widely deployed networking standards; uses the CSMA/CD method of media access control.
Ethernet
false negative
National Security Agency
Tiger Team
43. Hashing algorithm that results in a 128-bit output.
Bit Flipping
MD5
penetration testing
Crossover Error Rate (CER)
44. A nonnumerical - subjective risk evaluation. Used with qualitative assessment (an evaluation of risk that results in ratings of none - low - medium - and high for the probability.)
infrastructure mode
Target Of Engagement (TOE)
qualitative analysis
Post Office Protocol 3 (POP3)
45. Hex 12
Database
Level I assessment
A S
International Organization for Standardization (ISO)
46. A program designed to execute at a specific time to release malicious code onto the computer system or network.
intrusion prevention system (IPS)
-oG
War Dialing
Time Bomb
47. A program designed to browse websites in an automated - methodical manner. Sometimes these programs are used to harvest information from websites - such as e-mail addresses.
Web Spider
pattern matching
-sU
Time Bomb
48. Formal description and evaluation of the vulnerabilities in an information system
Finger
Vulnerability Assessment
public key infrastructure (PKI)
serialize scans & 0.4 sec wait
49. Normal scan timing
parallel scan
-PI
hot site
Application Layer
50. An Application layer protocol used primarily by Microsoft Windows to provide shared access to printers - files - and serial ports. It also provides an authenticated interprocess communication mechanism.
SNMP
Common Internet File System/Server Message Block
segment
Virus Hoax