SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Conversion of plaintext to ciphertext through the use of a cryptographic algorithm.
404EE
sheepdip
quantitative risk assessment
encryption
2. The potential for damage to or loss of an IT asset
integrity
network access server
risk
802.11
3. Port 110
spam
POP 3
Whois
Block Cipher
4. A formal set of rules describing data transmission - especially across a network. A protocol determines the type of error checking - the data compression method - how the sending device will indicate completion - how the receiving device will indicat
Kerberos
inference attack
False Acceptance Rate (FAR)
protocol
5. ICMP Type/Code 3-13
Digital Signature
Administratively Prohibited
Bastion host
encapsulation
6. The software product or system that is the subject of an evaluation.
Detective Controls
packet
public key
Target Of Engagement (TOE)
7. TCP connect() scan
hot site
-sT
identity theft
hacktivism
8. Shifting responsibility from one party to another
risk transference
White Box Testing
halo effect
Overwhelm CAM table to convert switch to hub mode
9. Port 135
RPC-DCOM
Reconnaissance - Scanning - Gaining Access - Maintaining Access - Covering Tracks
User Datagram Protocol (UDP)
Web Spider
10. Confidentiality - Integrity - and Availability are the three aspects of security and make up the triangle.
Wireless Local Area Network (WLAN)
net use \[target ip]IPC$ '' /user:''
CIA triangle
risk transference
11. Physical socket provided on routers and switches for cable connections between a computer and the router/switch. This connection enables the computer to configure - query - and troubleshoot the router/switch by use of a terminal emulator and a comman
Wiretapping
Console Port
Domain Name System (DNS) cache poisoning
Cracker
12. A security protocol for wireless local area networks defined in the 802.11b standard; intended to provide the same level of security as a wired LAN. WEP is not considered strong security - although it does authenticate clients to access points - encr
Wired Equivalent Privacy (WEP)
Echo Reply
-sL
Acceptable Use Policy (AUP)
13. A function that is easy to compute in one direction - yet believed to be difficult to compute in the opposite direction (finding its inverse) without special information - called the 'trapdoor.' Widely used in cryptography.
Telnet
Trapdoor Function
Finger
Request for Comments (RFC)
14. The condition of a resource being ready for use and accessible by authorized users.
The automated process of proactively identifying vulnerabilities of computing systems present in a network
Level III assessment
Vulnerability
Availability
15. A standard that provides best-practice recommendations on information security management for use by those responsible for initiating - implementing - or maintaining Information Security Management Systems (ISMS). Information security is defined with
smart card
Blowfish
-PI
ISO 17799
16. Transmission using channels or frequencies outside those normally used for data transfer; often used for error reporting.
Local Administrator
Authorization
security breach or security incident
out-of-band signaling
17. Also known as the dot-dot-slash attack. Using directory traversal - the attacker attempts to access restricted directories and execute commands outside intended web server directories by using the URL to redirect to an unintended folder location.
patch
-PT
Directory Traversal
Hacks with permission
18. Software or hardware components that restrict access between a protected network and the Internet - or between other sets of networks - to block unwanted use or attacks.
Network Address Translation (NAT)
security bulletins
firewall
Certificate Authority (CA)
19. Software or firmware intended to perform an unauthorized process that will have an adverse impact on the confidentiality - integrity - or availability of an information system. A virus - worm - Trojan horse - or other code-based entity that infects a
Malicious code
intranet
rogue access point
Asymmetric Algorithm
20. A Unix-like computer operating system descending from the BSD. Open-BSD includes a number of security features absent or optional in other operating systems.
OpenBSD
War Dialing
-oA
Virtual Local Area Network (VLAN)
21. A distance-vector routing protocol that employs the hop count as a routing metric. The 'hold down time -' used to define how long a route is held in memory - is 180 seconds. RIP prevents routing loops by implementing a limit on the number of hops all
Active Fingerprinting
Routing Information Protocol (RIP)
source routing
Database
22. An attack technique that tricks your DNS server into believing it has received authentic information when - in reality - it has been provided fraudulent data. DNS cache poisoning affects user traffic by sending it to erroneous or malicious end points
CNAME record
Domain Name System (DNS) cache poisoning
War Driving
Vulnerability
23. The ability to trace actions performed on a system to a specific user or system entity.
Trusted Computer System Evaluation Criteria (TCSEC)
Asset
Accountability
-PT
24. The act of checking some sequence of tokens for the presence of the constituents of some pattern.
Hacks without permission
pattern matching
Audit Data
Institute of Electrical and Electronics Engineers (IEEE)
25. Calculations of two components of risk: R - the magnitude of the potential loss (L) - and the probability - p - that the loss will occur.
Time To Live (TTL)
Threat
Routing Protocol
quantitative risk assessment
26. Hex 04
R
Methodology
Target Of Engagement (TOE)
A series of messages sent by someone attempting to break into a computer to learn about the computer's network services.
27. Devices - connected to one or more switches - grouped logically into a single broadcast domain. VLANs enable administrators to divide the devices connected to the switches into multiple VLANs without requiring separate physical switches.
Database
Level I assessment
Telnet
Virtual Local Area Network (VLAN)
28. A small Trojan program that listens on port 777.
User Datagram Protocol (UDP)
SID
packet filtering
Tini
29. An environmentally conditioned workspace partially equipped with IT and telecommunications equipment to support relocated IT operations in the event of a significant disruption.
Warm Site
security by obscurity
Assessment
hash
30. A domain composed of all the systems sharing any given physical transport media. Systems within a collision domain may collide with each other during the transmission of data. Collisions can be managed by CSMA/CD (collision detection) or CSMA/CA (col
Active Directory (AD)
Collision Domain
Threat
NetBus
31. SYN Ping
-PS
Real application encompassing Trojan
Wrapper
Auditing
32. The conveying of official access or legal power to a person or entity.
Secure Multipurpose Mail Extension (S/MIME)
security breach or security incident
Authorization
private key
33. RPC Scan
sniffer
-sR
secure channel
Serial Line Internet Protocol (SLIP)
34. An industry standard protocol used for accessing and managing information within a directory service; an application protocol for querying and modifying data using directory services running over TCP/IP.
Archive
Lightweight Directory Access Protocol (LDAP)
security breach or security incident
Timestamping
35. Any network incident that prompts some kind of log entry or other notification.
physical security
NetBus
Level III assessment
Event
36. Nmap ml output
hardware keystroke logger
-oX
Event
Level III assessment
37. A network system of servers that translates numeric Internet Protocol (IP) addresses into human-friendly - hierarchical Internet addresses - and vice versa.
Domain Name System (DNS)
Presentation layer
single loss expectancy (SLE)
Hacks with permission
38. The exploitation of a security vulnerability
halo effect
security breach or security incident
parallel scan
Internet service provider (ISP)
39. Metamorphic Virus
risk
Self Replicating
Target Of Engagement (TOE)
Three-Way (TCP) Handshake
40. The process of transforming ciphertext into plaintext through the use of a cryptographic algorithm.
Banner Grabbing
key exchange protocol
R
Decryption
41. A condition that occurs when more data is written to a buffer than it has space to store - and results in data corruption or other system errors. This is usually due to insufficient bounds checking - a bug - or improper configuration in the program c
physical security
Zone transfer
-PT
Buffer Overflow
42. NSA
symmetric algorithm
National Security Agency
Internet service provider (ISP)
NetBSD
43. A standard for encrypting e-mail - web pages - and other stream-oriented information transmitted over the Internet.
Transport Layer Security (TLS)
remote access
risk
Authentication - Authorization - and Accounting (AAA)
44. The secret portion of an asymmetric key pair typically used to decrypt or digitally sign data. The private key is never shared and is always used for decryption - with one notable exception: The private key is used to encrypt the digital signature.
Point-to-Point Protocol (PPP)
parallel scan & 75 sec timeout & 0.3 sec/probe
private key
SSH
45. A physical security attack where the attacker sifts through garbage and recycle bins for information that may be useful on current and future attacks
footprinting
Dumpster Diving
Console Port
File Allocation Table (FAT)
46. Terminal Access Controller Access-Control System. A remote authentication protocol that is used to communicate with an authentication server commonly used in Unix networks.
Access Creep
Echo Reply
TACACS
Countermeasures
47. A number assigned during TCP startup sessions that tracks how much information has been moved. This number is used by hackers when hijacking sessions.
FTP
initial sequence number (ISN)
Denial of Service (DoS)
port redirection
48. An attack where the hacker repeats a portion of a cryptographic exchange in hopes of fooling the system into setting up a communications channel.
replay attack
parallel scan & 300 sec timeout & 1.25 sec/probe
infrastructure mode
quantitative risk assessment
49. MAC Flooding
Overwhelm CAM table to convert switch to hub mode
Extensible Authentication Protocol (EAP)
security controls
serial scan & 300 sec wait
50. An Application layer protocol used by local email clients to retrieve e-mail from a remote server over a TCP/IP connection.
iris scanner
-oG
Post Office Protocol 3 (POP3)
Point-to-Point Protocol (PPP)