SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Hex 10
security kernel
A
Bastion host
NT LAN Manager (NTLM)
2. A storage buffer that transparently stores data so future requests for the same data can be served faster.
S
port scanning
Cache
promiscuous mode
3. A number assigned during TCP startup sessions that tracks how much information has been moved. This number is used by hackers when hijacking sessions.
Information Technology (IT) security architecture and framework
net use \[target ip]IPC$ '' /user:''
Hypertext Transfer Protocol Secure (HTTPS)
initial sequence number (ISN)
4. A TCP flag notifying an originating station that the preceding packet (or packets) has been received.
router
Acknowledgment (ACK)
CAM table
serialize scans & 15 sec wait
5. Malware designed to install some sort of virus - backdoor - and so on - on a target system.
S
security defect
Digital Signature
Droppers
6. The public portion of an asymmetric key pair typically used to encrypt data or verify signatures. Public keys are shared and are used to encrypt messages.
public key
-PS
reverse social engineering
Exposure Factor
7. A security protocol used in IEEE 802.11i to replace WEP without the requirement to replace legacy hardware.
Back orifice
Temporal Key Integrity Protocol (TKIP)
TACACS
Master boot record infector
8. A suite of protocols used for securing Internet Protocol (IP) communications by authenticating and encrypting each IP packet of a communication session. This suite includes protocols for establishing mutual authentication between agents at the sessio
A
quality of service (QoS)
Cookie
Internet Protocol Security (IPSec) architecture
9. The lack of clocking (imposed time ordering) on a bit stream.
Man-in-the-middle attack
hash
Asynchronous
Data Encryption Standard (DES)
10. A brand name of analog scrambling and de-scrambling equipment for cable and satellite television - invented primarily to keep consumer Television receive-only (TVRO) satellite equipment from receiving TV programming except on a subscription basis.
Videocipher II Satellite Encryption System
smart card
risk transference
Internet Protocol (IP)
11. A skilled hacker that straddles the line between white hat (hacking only with permission and within guidelines) and black hat (malicious hacking for personal gain). Gray hats sometime perform illegal acts to exploit technology with the intent of achi
Time Bomb
segment
SID
gray hat
12. A value used to control cryptographic operations - such as decryption -encryption - signature generation - and signature verification.
Port Address Translation (PAT)
Cryptographic Key
-P0
-sP
13. Any kind of connection that allows you to see all traffic passing by. Generally used in reference to a NIDS (network-based IDS) to monitor all traffic.
Block Cipher
Data Encryption Standard (DES)
network tap
Countermeasures
14. Software or hardware components that restrict access between a protected network and the Internet - or between other sets of networks - to block unwanted use or attacks.
false rejection rate (FRR)
integrity
symmetric algorithm
firewall
15. A hacking method for stealing the cookies used during a session build and replaying them for unauthorized connection purposes.
sidejacking
Audit Data
Master boot record infector
Network Basic Input/Output System (NetBIOS)
16. A command used in HTTP and FTP to retrieve a file from a server.
GET
patch
Detective Controls
hash
17. A physical security attack where the attacker sifts through garbage and recycle bins for information that may be useful on current and future attacks
identity theft
Defense in Depth
Zombie
Dumpster Diving
18. The directory service created by Microsoft for use on itsnetworks. Provides a variety of network services using Lightweight Directory Access Protocol (LDAP) - Kerberos-based authentication - and single sign-on for user access to network-based resourc
Active Directory (AD)
stateful packet filtering
Man-in-the-middle attack
quality of service (QoS)
19. The process of attaching a particular protocol header and trailer to a unit of data before transmission on the network. Occurs at layer 2 of the OSI reference model.
Telnet
encapsulation
Overwhelm CAM table to convert switch to hub mode
Tini
20. Hex 14
packet
encapsulation
Simple Mail Transfer Protocol (SMTP)
A R
21. In regard to hash algorithms - this occurs when two or more distinct inputs produce the same output.
File Allocation Table (FAT)
Last In First Out (LIFO)
parallel scan & 75 sec timeout & 0.3 sec/probe
Collision
22. An information assurance strategy in which multiple layers of defense are placed throughout an Information Technology system.
802.11
Authentication Header (AH)
Routing Information Protocol (RIP)
Defense in Depth
23. A hardware device used to log keystrokes covertly. Hardware keystroke loggers are very dangerous due to the fact that they cannot be detected through regular software/anti-malware scanning.
Ciphertext
Zero Subnet
Wi-Fi Protected Access (WPA)
hardware keystroke logger
24. A class of algorithms for cryptography that use the same cryptographic key for both decryption and encryption.
symmetric algorithm
-sO
Local Administrator
separation of duties
25. The process of a system providing a fully qualified domain name (FQDN) to a local name server - for resolution to its corresponding IP address.
serial scan & 300 sec wait
spoofing
Virtual Local Area Network (VLAN)
Domain Name System (DNS) lookup
26. A computer security expert who performs security audits and penetration tests against systems or network segments - with the owner's full knowledge and permission - in an effort to increase security.
Authorization
Ethical Hacker
intrusion prevention system (IPS)
CAM table
27. An attack that combines a brute-force attack with a dictionary attack.
replay attack
Routing Protocol
Finding a directory listing and gaining access to a parent or root file for access to other files
hybrid attack
28. A derogatory term used to describe an attacker - usually new to the field - who uses simple - easy-to-follow scripts or programs developed by others to attack computer systems and networks and deface websites.
Administratively Prohibited
script kiddie
Request for Comments (RFC)
Buffer Overflow
29. A U.S. Department of Defense (DoD) standard that sets basic requirements for assessing the effectiveness of computer security controls built into a computer system.
Sign in Seal
Archive
Trusted Computer System Evaluation Criteria (TCSEC)
Time Bomb
30. The concept of having more than one person required to complete a task
separation of duties
security bulletins
private key
sniffer
31. Software that has advertisements embedded within. Generally displays ads in the form of pop-ups.
Client
Adware
encryption
pattern matching
32. 18 U.S.C. 1029
A
Domain Name System (DNS) cache poisoning
Possession of access devices
network tap
33. A collection of historical records or the place where they are kept. In computing - an archive generally refers to backup copies of logs and/or data.
Archive
Last In First Out (LIFO)
Secure Multipurpose Mail Extension (S/MIME)
source routing
34. Host-based IDS. An IDS that resides on the host - protecting against file and folder manipulation and other host-based attacks and actions.
HIDS
NT LAN Manager (NTLM)
RPC-DCOM
parameter tampering
35. A firewall evasion technique whereby packets are wrapped in HTTP - as a covert channel to the target.
Trapdoor Function
R
HTTP tunneling
overt channel
36. A computer process that requests a service from another computer and accepts the server's responses.
serialize scans & 0.4 sec wait
Ethical Hacker
single loss expectancy (SLE)
Client
37. Security identifier. The method by which Windows identifies user - group - and computer accounts for rights and permissions.
-sW
hacktivism
Bug
SID
38. The process of using easily accessible DNS records to map a target network's internal hosts.
Network Address Translation (NAT)
DNS enumeration
hashing algorithm
Minimum acceptable level of risk
39. A standard that provides best-practice recommendations on information security management for use by those responsible for initiating - implementing - or maintaining Information Security Management Systems (ISMS). Information security is defined with
intrusion detection system (IDS)
ISO 17799
spoofing
Administratively Prohibited
40. Idlescan
rogue access point
-sI
Virus
limitation of liability and remedies
41. Provides router-to-router or host-to-network connections over asynchronous and synchronous circuits.
serialize scans & 15 sec wait
quantitative risk assessment
heuristic scanning
Point-to-Point Protocol (PPP)
42. Set of tools (applications or code) that enables administrator-level accessto a computer or computer network and is designed to obscure the fact that the system has been compromised. Rootkits are dangerous malware entities that provide administrator
Adware
remote access
rootkit
security defect
43. Self-contained network with a limited number of participants who extend limited trust to one another in order to accomplish an agreed-upon goal.
intranet
halo effect
Domain Name
Cold Site
44. An authentication method on point-to-point links - using a three-way handshake and a mutually agreed-upon key.
Challenge Handshake Authentication Protocol (CHAP)
-sI
--randomize_hosts -O OS fingerprinting
gateway
45. An adapter that provides the physical connection to send and receive data between the computer and the network media.
public key
network interface card (NIC)
port scanning
Destination Unreachable
46. An Ethernet networking system transmitting data at 100 million bits per second (Mbps) - 10 times the speed of an earlier Ethernet standard. Derived from the Ethernet 802.3 standard - it is also known as 100BaseT.
Administratively Prohibited
Finger
Asset
Fast Ethernet
47. ICMP Type/Code 0-0
Echo Reply
Tunneling Virus
Interior Gateway Protocol (IGP)
File Transfer Protocol (FTP)
48. A communications path - such as the Internet - authorized for data transmission within a computer system or network.
Brute-Force Password Attack
overt channel
-PI
Access Creep
49. Network Scanning
Mantrap
A procedure for identifying active hosts on a network.
network tap
-sI
50. A wireless LAN device that acts as a central point for all wireless traffic. The AP is connected to both the wireless LAN and the wired LAN - providing wireless clients access to network resources.
Defense in Depth
Access Point (AP)
net use \[target ip]IPC$ '' /user:''
serial scan & 300 sec wait
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests