SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Recording the time - normally in a log file - when an event happens or when information is created or modified.
Timestamping
Black Box Testing
Asset
Acknowledgment (ACK)
2. Also known as a public key certificate - this is an electronic file that is used to verify a user's identity - providing non-repudiation throughout the sys-tem. Certificates contain the entity's public key - serial number - version - subject - algori
A R
War Driving
Virtual Private Network (VPN)
Digital Certificate
3. All measures and techniques taken to gather information about an intended target. Footprinting can be passive or active.
footprinting
Vulnerability
FreeBSD
Threat
4. Directing a protocol from one port to another.
forwarding
port redirection
Echo Reply
Back orifice
5. A social-engineering attack that manipulates the victim into calling the attacker for help.
reverse social engineering
-p <port ranges>
Zero Subnet
intrusion prevention system (IPS)
6. A protocol for transporting data packets across a packet switched internetwork (such as the Internet). IP is a routed protocol.
Destination Unreachable
Internet Protocol (IP)
Traceroute
limitation of liability and remedies
7. An attack against an authentication protocol in which the attacker intercepts data in transit along the network between the claimant and verifier - but does not alter the data (in other words - eavesdropping).
routed protocol
passive attack
local area network (LAN)
Wiretapping
8. A device set up to send a response on behalf of an end node to the requesting host. Proxies are generally used to obfuscate the host from the Internet.
Data Link layer
proxy server
DNS
keylogger
9. The process of using easily accessible DNS records to map a target network's internal hosts.
DNS enumeration
Telnet
security controls
risk transference
10. A set of related communications protocols operating together as a group to address communication at some or all of the seven layers of the OSI reference model.
protocol stack
Lightweight Directory Access Protocol (LDAP)
security kernel
INFOSEC Assessment Methodology (IAM)
11. A derogatory term used to describe an attacker - usually new to the field - who uses simple - easy-to-follow scripts or programs developed by others to attack computer systems and networks and deface websites.
script kiddie
risk transference
Information Technology (IT) asset criticality
Back orifice
12. The public portion of an asymmetric key pair typically used to encrypt data or verify signatures. Public keys are shared and are used to encrypt messages.
public key
security breach or security incident
Information Technology (IT) asset valuation
Transport Layer Security (TLS)
13. Insane scan timing
A S
parallel scan & 75 sec timeout & 0.3 sec/probe
personal identification number (PIN)
Point-to-Point Tunneling Protocol (PPTP)
14. A virus that plants itself in a system's boot sector and infects the master boot record.
scope creep
Open System Interconnection (OSI) Reference Model
-PT
Boot Sector Virus
15. A virus designed to infect the master boot record.
Filter
Master boot record infector
Data Link layer
MAC filtering
16. A formal set of rules describing data transmission - especially across a network. A protocol determines the type of error checking - the data compression method - how the sending device will indicate completion - how the receiving device will indicat
Zone transfer
Community String
protocol
proxy server
17. Sneaky scan timing
serialize scans & 15 sec wait
packet
piggybacking
intrusion prevention system (IPS)
18. Authentication confirms the identity of the user or device. Authorization determines the privileges (rights) of the user or device. Accounting records the access attempts - both successful and unsuccessful.
route
Authentication - Authorization - and Accounting (AAA)
Information Technology (IT) asset criticality
risk avoidance
19. A protocol for exchanging packets over a serial line.
Discretionary Access Control (DAC)
limitation of liability and remedies
-PS
Serial Line Internet Protocol (SLIP)
20. Weakness in an information system - system security procedures - internal controls - or implementation that could be exploited or triggered by a threat source.
SSH
shrink-wrap code attacks
Vulnerability
Unicode
21. An industry standard protocol used for accessing and managing information within a directory service; an application protocol for querying and modifying data using directory services running over TCP/IP.
Google hacking
Bit Flipping
Lightweight Directory Access Protocol (LDAP)
-PM
22. A card with a built-in microprocessor and memory used for identification or financial transactions. The card transfers data to and from a central computer when inserted into a reader.
Due Diligence
secure channel
RxBoot
smart card
23. A group of penetration testers that assess the security of an organization - which is often unaware of the existence of the team or the exact assignment.
red team
Backdoor
promiscuous mode
A R
24. The transmission of digital signals without precise clocking or synchronization.
ad hoc mode
Vulnerability Assessment
asynchronous transmission
Backdoor
25. An attack in which the hacker can derive information from the ciphertext without actually decoding it. Sensitive information can be considered compromised if an adversary can infer its real value with a high level of confidence.
inference attack
FTP
RxBoot
false rejection rate (FRR)
26. An authentication method on point-to-point links - using a three-way handshake and a mutually agreed-upon key.
CIA triangle
-sA
Challenge Handshake Authentication Protocol (CHAP)
Buffer Overflow
27. A type 0 ICMP message used to reply to ECHO requests. Used with ping to verify network layer connectivity between hosts.
ECHO reply
out-of-band signaling
key exchange protocol
Target Of Engagement (TOE)
28. A systematic process for the assessment of security vulnerabilities.
Cryptographic Key
Timestamping
INFOSEC Assessment Methodology (IAM)
Annualized Loss Expectancy (ALE)
29. Vulnerability Scanning
The automated process of proactively identifying vulnerabilities of computing systems present in a network
Ethical Hacker
-oN
War Chalking
30. A form of fraud in which someone pretends to be someone else by assuming that person's identity - typically in order to access resources or obtain credit and other benefits in that person's name.
identity theft
Eavesdropping
Sign in Seal
reverse lookup; reverse DNS lookup
31. The change or growth of a project's scope
Service Set Identifier (SSID)
Videocipher II Satellite Encryption System
scope creep
Cookie
32. A hardware device used to log keystrokes covertly. Hardware keystroke loggers are very dangerous due to the fact that they cannot be detected through regular software/anti-malware scanning.
Demilitarized Zone (DMZ)
ring topology
hardware keystroke logger
Echo Reply
33. A comparison metric for different biometric devices and technologies; the point at which the false acceptance rate (FAR) equals the
Crossover Error Rate (CER)
Level II assessment
Cloning
intrusion prevention system (IPS)
34. A set of hardware - software - people - policies - and procedures needed to create - manage - distribute - use - store - and revoke digital certificates.
Request for Comments (RFC)
fragmentation
passive attack
public key infrastructure (PKI)
35. The directory service created by Microsoft for use on itsnetworks. Provides a variety of network services using Lightweight Directory Access Protocol (LDAP) - Kerberos-based authentication - and single sign-on for user access to network-based resourc
packet filtering
Active Directory (AD)
GET
nslookup
36. A unit of information formatted according to specific protocols that allows precise transmittal of data from one network node to another. Also called a datagram or data packet - a packet contains a header (container) and a payload (contents). Any IP
stream cipher
Virus
packet
The automated process of proactively identifying vulnerabilities of computing systems present in a network
37. A self-replicating - self-propagating - self-contained program that uses networking mechanisms to spread itself.
Worm
sheepdip
Internet Control Message Protocol (ICMP)
Bluetooth
38. A network traffic management technique designed to allow applications to specify the route a packet will take to a destination - regardless of what the route tables between the two systems say.
Boot Sector Virus
source routing
-sL
Port Address Translation (PAT)
39. Nmap ml output
-sL
-oX
Asset
risk
40. An organized collection of data.
Database
Local Administrator
SID
symmetric algorithm
41. A three-step process computers execute to negotiate a connection with one another. The three steps are SYN - SYN/ACK - ACK.
Three-Way (TCP) Handshake
CIA triangle
Virus Hoax
Level III assessment
42. Originally an extension of PPP - this is a protocol for authentication used within wireless networks. Works with multiple authentication measures.
Wi-Fi
Extensible Authentication Protocol (EAP)
Wired Equivalent Privacy (WEP)
Replacing numbers in a url to access other files
43. Port 88
INFOSEC Assessment Methodology (IAM)
separation of duties
Administratively Prohibited
Kerberos
44. SYN Ping
-PS
serialize scans & 0.4 sec wait
Vulnerability Assessment
spoofing
45. A command used in HTTP and FTP to retrieve a file from a server.
GET
HTTP tunneling
gap analysis
Acceptable Use Policy (AUP)
46. The process of systematically testing each port on a firewall to map rules and determine accessible ports.
Data Link layer
HIDS
firewalking
ring topology
47. A method of defining what rights and permissions an entity has to a given resource. In networking - Access Control Lists are commonly associated with firewall and router traffic filtering rules.
Time To Live (TTL)
Access Control List (ACL)
Worm
Crossover Error Rate (CER)
48. One or more locations from which control is exercised over a computer - television broadcast - or telecommunications network.
network operations center (NOC)
Filter
penetration testing
Console Port
49. 18 U.S.C. 1029
Level I assessment
Possession of access devices
initial sequence number (ISN)
Collision
50. A piece of code intentionally inserted into a software system that will perform a malicious function when specified conditions are met at some future point.
Address Resolution Protocol (ARP)
Asset
logic bomb
Bluejacking