SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A program or piece of code inserted into a system - usually covertly - with the intent of compromising the confidentiality - integrity - or availability of the victim's data - applications - or operating system. Malware consists of viruses - worms -
-PB
Internet Control Message Protocol (ICMP)
Hacks without permission
Malware
2. Port 110
Demilitarized Zone (DMZ)
Written Authorization
POP 3
FreeBSD
3. A computer security expert who performs security audits and penetration tests against systems or network segments - with the owner's full knowledge and permission - in an effort to increase security.
Ethical Hacker
rule-based access control
Black Box Testing
Smurf attack
4. When an authorized person allows (intentionally or unintentionally) someone to pass through a secure door - despite the fact that the intruder does not have a badge.
A series of messages sent by someone attempting to break into a computer to learn about the computer's network services.
Bastion host
piggybacking
War Chalking
5. A data encryption/decryption program often used for e-mail and file storage.
Ciphertext
qualitative analysis
Pretty Good Privacy (PGP)
Sign in Seal
6. Nmap normal output
Wide Area Network (WAN)
secure channel
Daisy Chaining
-oN
7. nmap all output
Virtual Private Network (VPN)
-oA
role-based access control
-P0
8. The condition of a resource being ready for use and accessible by authorized users.
Availability
Vulnerability Assessment
Filter
Active Directory (AD)
9. Malware designed to install some sort of virus - backdoor - and so on - on a target system.
Assessment
Electronic serial number
service level agreements (SLAs)
Droppers
10. A proprietary - open - wireless technology used for transferring data from fixed and mobile devices over short distances.
Bluetooth
Common Internet File System/Server Message Block
-PT
queue
11. Directing a protocol from one port to another.
Third Party
Confidentiality
port redirection
Timestamping
12. Weakness in an information system - system security procedures - internal controls - or implementation that could be exploited or triggered by a threat source.
parallel scan & 75 sec timeout & 0.3 sec/probe
Vulnerability
firewalking
protocol
13. Defined in RFC 826 - ARP is a protocol used to map a known IP address to a physical (MAC) address.
DNS enumeration
forwarding
reverse social engineering
Address Resolution Protocol (ARP)
14. Controls to detect anomalies or undesirable events occurring on a system.
Dumpster Diving
Vulnerability Scanning
Detective Controls
Telnet
15. An industry standard protocol used for accessing and managing information within a directory service; an application protocol for querying and modifying data using directory services running over TCP/IP.
A procedure for identifying active hosts on a network.
Lightweight Directory Access Protocol (LDAP)
hacktivism
-b
16. In penetration testing - this is a method of testing the security of a system or subnet without any previous knowledge of the device or network. Designed to simulate an attack by an outside intruder (usually from the Internet).
Active Attack
Demilitarized Zone (DMZ)
Trapdoor Function
Black Box Testing
17. The security property that data is not modified in an unauthorized and undetected manner. Also - the principle and measures taken to ensure that data received is in the exact same condition and state as when it was originally transmitted.
Daemon
integrity
Mandatory access control (MAC)
John the Ripper - LOphtcrack - Ophtcrack - Cain and Abel
18. A connectionless - layer 4 transport protocol. UDP is faster than TCP - but offers no reliability. A best effort is made to deliver the data - but no checks and verifications are performed to guarantee delivery. Therefore - UDP is termed a 'connectio
TACACS
User Datagram Protocol (UDP)
-PP
port redirection
19. NSA
Information Technology (IT) security architecture and framework
NT LAN Manager (NTLM)
TACACS
National Security Agency
20. A connection-oriented - layer 4 protocol for transporting data over network segments. TCP is considered reliable because it guarantees delivery and the proper reordering of transmitted packets. This protocol is used for most long-haul traffic on the
Transmission Control Protocol (TCP)
footprinting
packet
-P0
21. Unauthorized access to information such as a calendar - contact list - e-mails - and text messages on a wireless device through a Bluetooth connection.
Bluesnarfing
Three-Way (TCP) Handshake
Authorization
security controls
22. A limit on the amount of time or number of iterations or transmissions in computer and network technology a packet can experience before it will be discarded.
Time To Live (TTL)
Data Encryption Standard (DES)
Hierarchical File System (HFS)
Mandatory access control (MAC)
23. The result of using a private key to encrypt a hash value for identification purposes within a PKI system. The signature can be decoded by the originator's public key - verifying his identity and providing non-repudiation. A valid digital signature g
Digital Signature
heuristic scanning
-PB
risk
24. An attack technique that tricks your DNS server into believing it has received authentic information when - in reality - it has been provided fraudulent data. DNS cache poisoning affects user traffic by sending it to erroneous or malicious end points
Domain Name System (DNS) cache poisoning
Worm
Open System Interconnection (OSI) Reference Model
gap analysis
25. An attack against an authentication protocol in which the attacker intercepts data in transit along the network between the claimant and verifier - but does not alter the data (in other words - eavesdropping).
passive attack
-sO
Self Replicating
Ciphertext
26. A unit of information formatted according to specific protocols that allows precise transmittal of data from one network node to another. Also called a datagram or data packet - a packet contains a header (container) and a payload (contents). Any IP
false rejection rate (FRR)
shoulder surfing
packet
risk assessment
27. An organization composed of engineers - scientists - and students who issue standards related to electrical - electronic - and computer engineering.
Institute of Electrical and Electronics Engineers (IEEE)
Decryption
User Datagram Protocol (UDP)
Crossover Error Rate (CER)
28. Actions - devices - procedures - techniques - or other measures intended to reduce the vulnerability of an information system.
White Box Testing
Countermeasures
Fiber Distributed Data Interface (FDDI)
Malicious code
29. Controlling access to a network by analyzing the headers of incoming and outgoing packets - and letting them pass or discarding them based on rule sets created by a network administrator. A packet filter allows or denies packets based on destination
packet filtering
Possession of access devices
Transport Layer Security (TLS)
-sP
30. Injecting traffic into the network to identify the operating system of a device.
Collision Domain
symmetric algorithm
Simple Mail Transfer Protocol (SMTP)
Active Fingerprinting
31. The steps taken to gather evidence and information on the targets you wish to attack.
infrastructure mode
security breach or security incident
reconnaissance
Internal access to the network
32. A symmetric key cipher where plaintext bits are combined with a pseudo-random cipher bit stream (keystream) - typically by an exclusive-or (XOR) operation. In a stream cipher the plaintext digits are encrypted one at a time - and the transformation o
Authentication
risk acceptance
Collision Domain
stream cipher
33. Port 161/162
Local Administrator
Event
SNMP
Banner Grabbing
34. A hacker who aims to bring down critical infrastructure for a 'cause' and does not worry about the penalties associated with his actions.
suicide hacker
-sI
Timestamping
-sO
35. A record showing which user has accessed a given resource and what operations the user performed during a given period.
Audit Trail
Cache
Denial of Service (DoS)
keylogger
36. The change or growth of a project's scope
Trapdoor Function
Web Spider
Three-Way (TCP) Handshake
scope creep
37. Conversion of plaintext to ciphertext through the use of a cryptographic algorithm.
Droppers
Internet Assigned Number Authority (IANA)
encryption
risk
38. A number assigned during TCP startup sessions that tracks how much information has been moved. This number is used by hackers when hijacking sessions.
initial sequence number (ISN)
Zombie
Data Link layer
SYN flood attack
39. The art and science of creating a covert message or image within another message - image - audio - or video file.
Access Control List (ACL)
-sA
Computer-Based Attack
steganography
40. A small space having two sets of interlocking doors; the first set of doors must close before the second set opens. Typically authentication is required for each door - often using different factors. For example - a smart card may open the first door
local area network (LAN)
Mantrap
Worm
Active Directory (AD)
41. A protocol used for sending and receiving log information for nodes on a network.
Syslog
Assessment
Wi-Fi
Redundant Array of Independent Disks (RAID)
42. A condition that occurs when more data is written to a buffer than it has space to store - and results in data corruption or other system errors. This is usually due to insufficient bounds checking - a bug - or improper configuration in the program c
-PT
Buffer Overflow
-sL
Request for Comments (RFC)
43. Ports 20/21
FTP
spoofing
Zone transfer
Audit Trail
44. A term trademarked by the Wi-Fi Alliance - used to define a standard for devices to use to connect to a wireless network.
Whois
802.11 i
halo effect
Wi-Fi
45. An information assurance strategy in which multiple layers of defense are placed throughout an Information Technology system.
NetBus
router
Defense in Depth
-P0
46. In a classful IPv4 subnet - this is the network number with all binary 0s in the subnet part of the number. When written in decimal - the zero subnet has the same number as the classful network number.
Console Port
Biometrics
Point-to-Point Protocol (PPP)
Zero Subnet
47. A type of attack used to deny service to legitimate users of a network resource by intentionally overloading the network with illegitimate TCP connection requests. SYN packets are sent repeatedly to the target - but the corresponding SYN/ACK response
segment
Routing Information Protocol (RIP)
Electronic Code Book (ECB)
SYN flood attack
48. A computer virus that infects and spreads in multiple ways.
Wi-Fi Protected Access (WPA)
Multipartite virus
Level II assessment
Active Attack
49. A Unix-like computer operating system descending from the BSD. Open-BSD includes a number of security features absent or optional in other operating systems.
Cache
OpenBSD
Denial of Service (DoS)
Dumpster Diving
50. Directory Transversal
Finding a directory listing and gaining access to a parent or root file for access to other files
sidejacking
Vulnerability Assessment
encryption