SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A device providing temporary - on-demand - point-to-point network access to users.
network access server
Extensible Authentication Protocol (EAP)
Interior Gateway Protocol (IGP)
Bastion host
2. Using conversation or some other interaction between people to gather useful information.
human-based social engineering
R
Methodology
Man-in-the-middle attack
3. The contents of a packet. A system attack requires the attacker to deliver a malicious payload that is acted upon and executed by the system.
Bastion host
payload
Zombie
Routing Protocol
4. A unit of information formatted according to specific protocols that allows precise transmittal of data from one network node to another. Also called a datagram or data packet - a packet contains a header (container) and a payload (contents). Any IP
Eavesdropping
spoofing
Assessment
packet
5. 1. The path a packet travels to reach the intended destination. Each individual device along the path traveled is called a hop. 2. Information contained on a device containing instructions for reaching other nodes on the network. This information can
Wrapper
passive attack
route
reverse social engineering
6. An unknown deficiency in software or some other product that results in a security vulnerability being identified.
Console Port
security incident response team (SIRT)
security defect
security controls
7. A class of algorithms for cryptography that use the same cryptographic key for both decryption and encryption.
Availability
protocol stack
symmetric algorithm
limitation of liability and remedies
8. A penetration test in which the ethical hacker has limited knowledge of the intended target(s). Designed to simulate an internal - but non-systemadministrator-level attack.
Smurf attack
patch
gray box testing
The automated process of proactively identifying vulnerabilities of computing systems present in a network
9. Describes practices in production and development that promote access to the end product's source materials.
open source
Virtual Local Area Network (VLAN)
Multipurpose Internet Mail Extensions (MIME)
Anonymizer
10. The secret portion of an asymmetric key pair typically used to decrypt or digitally sign data. The private key is never shared and is always used for decryption - with one notable exception: The private key is used to encrypt the digital signature.
private key
Backdoor
Address Resolution Protocol (ARP) table
Database
11. Originally an extension of PPP - this is a protocol for authentication used within wireless networks. Works with multiple authentication measures.
Pretty Good Privacy (PGP)
Extensible Authentication Protocol (EAP)
-oX
Certificate Authority (CA)
12. The act of dialing all numbers within an organization to discover open modems.
asynchronous transmission
sidejacking
rootkit
War Dialing
13. A brand name of analog scrambling and de-scrambling equipment for cable and satellite television - invented primarily to keep consumer Television receive-only (TVRO) satellite equipment from receiving TV programming except on a subscription basis.
identity theft
Access Creep
-sA
Videocipher II Satellite Encryption System
14. A one-way mathematical function that generates a fixedlength numerical string (hash) from a given data input. MD5 and SHA-1 are hashing algorithms.
symmetric encryption
halo effect
hashing algorithm
Mantrap
15. Ping Scan
Application-Level Attacks
reverse social engineering
-sP
audit
16. A security protocol used in IEEE 802.11i to replace WEP without the requirement to replace legacy hardware.
Decryption
Packet Internet Groper (ping)
Ethernet
Temporal Key Integrity Protocol (TKIP)
17. The act of checking some sequence of tokens for the presence of the constituents of some pattern.
Database
security by obscurity
pattern matching
Hacks without permission
18. The rate at which a biometric system will incorrectly reject an access attempt by an authorized user.
Rijndael
serialize scans & 0.4 sec wait
--randomize_hosts -O OS fingerprinting
false rejection rate (FRR)
19. ICMP Netmask
encapsulation
Virus Hoax
-PM
Interior Gateway Protocol (IGP)
20. A section or subset of the network. Often a router or other routing device provides the end point of the segment.
segment
MD5
security breach or security incident
Internet service provider (ISP)
21. Port 161/162
SNMP
Presentation layer
Eavesdropping
parameter tampering
22. A piece of software - provided by the vendor - intended to update or fix known - discovered problems in a computer program or its supporting data.
gray hat
Extensible Authentication Protocol (EAP)
patch
Port Address Translation (PAT)
23. Microsoft SID 500
XOR Operation
parallel scan
quantitative risk assessment
Local Administrator
24. The process of embedding information into a digital signal in a way that makes it difficult to remove.
Digital Watermarking
Domain Name System (DNS)
Cookie
spam
25. An attacker who breaks into computer systems with malicious intent - without the owner's knowledge or permission.
footprinting
Black Hat
security defect
ring topology
26. All measures and techniques taken to gather information about an intended target. Footprinting can be passive or active.
A S
spoofing
open source
footprinting
27. Idlescan
INFOSEC Assessment Methodology (IAM)
-sI
Information Technology (IT) security architecture and framework
Bastion host
28. Name given to expert groups that handle computer security incidents.
node
human-based social engineering
Computer Emergency Response Team (CERT)
Ethical Hacker
29. Wrapper or Binder
-b
Password Authentication Protocol (PAP)
Real application encompassing Trojan
MAC filtering
30. A decision to reduce the potential for damage to or loss of an IT asset by taking some type of action
-PB
risk avoidance
CAM table
risk transference
31. RPC Scan
encapsulation
-sR
Assessment
gap analysis
32. An attack in which the hacker can derive information from the ciphertext without actually decoding it. Sensitive information can be considered compromised if an adversary can infer its real value with a high level of confidence.
signature scanning
inference attack
-PT
Access Control List (ACL)
33. A technology where you advertise one IP address externally and data packets are rerouted to the appropriate IP address inside your network by a device providing translation services. In this way - IP addresses of machines on your internal network are
Target Of Engagement (TOE)
integrity
Network Address Translation (NAT)
Level I assessment
34. A series of documents and notes on standards used or proposed for use on the Internet; each is identified by a number.
RxBoot
passive attack
Request for Comments (RFC)
Last In First Out (LIFO)
35. A remote control program in which the client runs on a local computer and connects to a remote server on a network. Commands entered locally are executed on the remote system.
Telnet
non-repudiation
Institute of Electrical and Electronics Engineers (IEEE)
Third Party
36. A protocol for transporting data packets across a packet switched internetwork (such as the Internet). IP is a routed protocol.
-PB
Application Layer
Internet Protocol (IP)
Time To Live (TTL)
37. An authentication method on point-to-point links - using a three-way handshake and a mutually agreed-upon key.
security controls
protocol
HIDS
Challenge Handshake Authentication Protocol (CHAP)
38. A stand-alone computer - kept off the network - that is used for scanning potentially malicious media or software.
Acknowledgment (ACK)
Bluetooth
sheepdip
File Transfer Protocol (FTP)
39. A standard developed to enable routers to exchange messages containing information about routes to reach subnets in the network.
Routing Protocol
-PP
Domain Name System (DNS) lookup
source routing
40. A storage buffer that transparently stores data so future requests for the same data can be served faster.
-sS
ad hoc mode
open source
Cache
41. A documented process for a procedure designed to be consistent - repeatable - and accountable.
Methodology
SAM
Covert Channel
patch
42. A number assigned during TCP startup sessions that tracks how much information has been moved. This number is used by hackers when hijacking sessions.
personal identification number (PIN)
initial sequence number (ISN)
-sV
suicide hacker
43. Controlling access to a network by analyzing the headers of incoming and outgoing packets - and letting them pass or discarding them based on rule sets created by a network administrator. A packet filter allows or denies packets based on destination
Port Address Translation (PAT)
Digital Signature
intranet
packet filtering
44. nmap
inference attack
No previous knowledge of the network
Discretionary Access Control (DAC)
-p <port ranges>
45. An attack where the hacker positions himself between the client and the server - to intercept (and sometimes alter) data traveling between the two.
remote procedure call (RPC)
Man-in-the-middle attack
-PP
DNS
46. Establish Null Session
RID Resource identifier
Echo request
net use \[target ip]IPC$ '' /user:''
segment
47. The change or growth of a project's scope
scope creep
Methodology
Replacing numbers in a url to access other files
non-repudiation
48. Whether purposeful or the result of malware or other attack - a backdoor is a hidden capability in a system or program for bypassing normal computer authentication systems.
ad hoc mode
symmetric encryption
Backdoor
rule-based access control
49. A protocol that allows a client computer to request services from a server and the server to return the results.
Reconnaissance - Scanning - Gaining Access - Maintaining Access - Covering Tracks
remote procedure call (RPC)
802.11
replay attack
50. In a classful IPv4 subnet - this is the network number with all binary 0s in the subnet part of the number. When written in decimal - the zero subnet has the same number as the classful network number.
Backdoor
Zero Subnet
Malware
-sT