SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A group of experts that handles computer security incidents.
security breach or security incident
Decryption
Unicode
security incident response team (SIRT)
2. A condition that occurs when more data is written to a buffer than it has space to store - and results in data corruption or other system errors. This is usually due to insufficient bounds checking - a bug - or improper configuration in the program c
Buffer Overflow
Brute-Force Password Attack
Ethernet
Network Address Translation (NAT)
3. A computer security expert who performs security audits and penetration tests against systems or network segments - with the owner's full knowledge and permission - in an effort to increase security.
Transmission Control Protocol (TCP)
ISO 17799
Digital Watermarking
Ethical Hacker
4. An unknown deficiency in software or some other product that results in a security vulnerability being identified.
Finding a directory listing and gaining access to a parent or root file for access to other files
security defect
Transmission Control Protocol (TCP)
Zone transfer
5. Malware designed to install some sort of virus - backdoor - and so on - on a target system.
Droppers
SSH
Sign in Seal
single loss expectancy (SLE)
6. The process of sending a packet or frame toward the destination. In a switch - messages are forwarded only to the port they are addressed to.
Exploit
routed protocol
parallel scan & 75 sec timeout & 0.3 sec/probe
forwarding
7. A computer process that requests a service from another computer and accepts the server's responses.
Client
packet filtering
SYN attack
hot site
8. Two or more LANs connected by a high-speed line across a large geographical area.
fragmentation
Wide Area Network (WAN)
Demilitarized Zone (DMZ)
Telnet
9. An inspection of a place where a company or individual proposes to work - to gather the necessary information for a design or risk assessment.
Tunnel
-sL
Web Spider
site survey
10. Transmission using channels or frequencies outside those normally used for data transfer; often used for error reporting.
out-of-band signaling
Bluetooth
Hypertext Transfer Protocol (HTTP)
Simple Network Management Protocol (SNMP)
11. Phases of an attack
Malware
Reconnaissance - Scanning - Gaining Access - Maintaining Access - Covering Tracks
Active Fingerprinting
Zenmap
12. The subjective - potential percentage of loss to a specific asset if a specific threat is realized. The exposure factor (EF) is a subjective value the person assessing risk must define.
routed protocol
Macro virus
Simple Network Management Protocol (SNMP)
Exposure Factor
13. A value assigned to uniquely identify a single wide area network (WAN) in wireless LANs. SSIDs are broadcast by default - and are sent in the header of every packet. SSIDs provide no encryption or security.
Vulnerability Assessment
Temporal Key Integrity Protocol (TKIP)
Service Set Identifier (SSID)
social engineering
14. Port 161/162
SNMP
service level agreements (SLAs)
self encrypting
-oG
15. A configuration of a network card that makes the card pass all traffic it receives to the central processing unit rather than just frames addressed to it
promiscuous mode
Extensible Authentication Protocol (EAP)
Crossover Error Rate (CER)
social engineering
16. A network traffic management technique designed to allow applications to specify the route a packet will take to a destination - regardless of what the route tables between the two systems say.
NetBSD
-sF
source routing
Certificate
17. Idlescan
Virus
Telnet
gap analysis
-sI
18. A utility that traces a packet from your computer to an Internet host - showing how many hops the packet takes to reach the host and how long the packet requires to complete the hop.
POST
Threat
route
Traceroute
19. A program designed to execute at a specific time to release malicious code onto the computer system or network.
Vulnerability
Time Bomb
Cracker
-PI
20. A one-way mathematical function that generates a fixedlength numerical string (hash) from a given data input. MD5 and SHA-1 are hashing algorithms.
Vulnerability Scanning
Acknowledgment (ACK)
hashing algorithm
War Chalking
21. A well-known and studied phenomenon of human nature - whereby a single trait influences the perception of other traits.
false rejection rate (FRR)
Wireless Local Area Network (WLAN)
halo effect
Information Technology (IT) infrastructure
22. A simple PPP authentication mechanism in which the user name and password are transmitted in clear text to prove identity. PAP compares the user name and password to a table listing authorized users.
Password Authentication Protocol (PAP)
Access Creep
patch
ECHO reply
23. An attack where the hacker repeats a portion of a cryptographic exchange in hopes of fooling the system into setting up a communications channel.
replay attack
Trusted Computer Base (TCB)
patch
Hacks with permission
24. nmap
hashing algorithm
halo effect
-sO
-p <port ranges>
25. MAC Flooding
infrastructure mode
OpenBSD
symmetric encryption
Overwhelm CAM table to convert switch to hub mode
26. The default network authentication suite of protocols for Windows NT 4.0
802.11 i
The automated process of proactively identifying vulnerabilities of computing systems present in a network
shrink-wrap code attacks
NT LAN Manager (NTLM)
27. NSA
Hacks with permission
Distributed DoS (DDoS)
National Security Agency
Password Authentication Protocol (PAP)
28. An attack where the hacker positions himself between the client and the server - to intercept (and sometimes alter) data traveling between the two.
Buffer Overflow
Man-in-the-middle attack
SAM
Detective Controls
29. A brand name of analog scrambling and de-scrambling equipment for cable and satellite television - invented primarily to keep consumer Television receive-only (TVRO) satellite equipment from receiving TV programming except on a subscription basis.
Echo Reply
network access server
stream cipher
Videocipher II Satellite Encryption System
30. The set of all hardware - firmware - and/or software components critical to IT security. Bugs or vulnerabilities occurring inside the TCB might jeopardize the security properties of the entire system.
Internal access to the network
Hacks without permission
Trusted Computer Base (TCB)
POST
31. The transmission of digital signals without precise clocking or synchronization.
Droppers
Hacks with permission
asynchronous transmission
FreeBSD
32. Steps taken to identify and limit risks to an acceptable or reasonable level of exposure.
Due Diligence
security by obscurity
Routing Information Protocol (RIP)
Bit Flipping
33. A self-replicating - self-propagating - self-contained program that uses networking mechanisms to spread itself.
Worm
hash
Cold Site
flood
34. Port 88
Temporal Key Integrity Protocol (TKIP)
Wi-Fi Protected Access (WPA)
DNS enumeration
Kerberos
35. The science or study of protecting information - whether in transit or at rest - by using techniques to render the information unusable to anyone who does not possess the means to decrypt it.
Interior Gateway Protocol (IGP)
Electronic serial number
Defense in Depth
Cryptography
36. A defined measure of service within a network system
-sO
Service Set Identifier (SSID)
packet
quality of service (QoS)
37. A connection-oriented - layer 4 protocol for transporting data over network segments. TCP is considered reliable because it guarantees delivery and the proper reordering of transmitted packets. This protocol is used for most long-haul traffic on the
Annualized Loss Expectancy (ALE)
Zombie
Transmission Control Protocol (TCP)
ISO 17799
38. A secret - typically consisting of only decimal digits - that a claimant memorizes and uses to authenticate his identity
personal identification number (PIN)
reverse social engineering
Access Point (AP)
spam
39. Policy stating what users of a system can and cannot do with the organization's assets.
Anonymizer
operating system attack
Trojan Horse
Acceptable Use Policy (AUP)
40. The basis of this kind of security is that an individual user - or program operating on the user's behalf - is allowed to specify explicitly the types of access other users (or programs executing on their behalf) may have to information under the use
Discretionary Access Control (DAC)
Asymmetric Algorithm
Kerberos
gateway
41. Computer software or hardware that can intercept and log traffic passing over a digital network.
sidejacking
sniffer
iris scanner
payload
42. Unauthorized access to information such as a calendar - contact list - e-mails - and text messages on a wireless device through a Bluetooth connection.
port scanning
Wiretapping
Bluesnarfing
Sign in Seal
43. Authentication confirms the identity of the user or device. Authorization determines the privileges (rights) of the user or device. Accounting records the access attempts - both successful and unsuccessful.
Authentication - Authorization - and Accounting (AAA)
Request for Comments (RFC)
Network Basic Input/Output System (NetBIOS)
route
44. A fully operational off-site data-processing facility equipped with hardware and system software to be used in the event of a disaster.
pattern matching
sniffer
Rijndael
hot site
45. PI and PT Ping
Wi-Fi Protected Access (WPA)
human-based social engineering
-PB
social engineering
46. 1. The path a packet travels to reach the intended destination. Each individual device along the path traveled is called a hop. 2. Information contained on a device containing instructions for reaching other nodes on the network. This information can
route
Simple Object Access Protocol (SOAP)
-sO
public key infrastructure (PKI)
47. Security identifier. The method by which Windows identifies user - group - and computer accounts for rights and permissions.
RxBoot
Time Bomb
Defines legal email marketing
SID
48. A set of exclusive rights granted by the law of a jurisdiction to the author or creator of an original work - including the right to copy - distribute - and adapt the work.
War Driving
Copyright
gateway
symmetric encryption
49. The condition of a resource being ready for use and accessible by authorized users.
service level agreements (SLAs)
Availability
OpenBSD
spoofing
50. Sending packets or requests to another system to gain information to be used to identify weaknesses and protect the system from attacks.
Wireless Local Area Network (WLAN)
gray hat
Vulnerability Scanning
Asynchronous