SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. An environmentally conditioned workspace partially equipped with IT and telecommunications equipment to support relocated IT operations in the event of a significant disruption.
Telnet
Virtual Private Network (VPN)
personal identification number (PIN)
Warm Site
2. Idlescan
Community String
-sI
Console Port
Bluejacking
3. A value used to control cryptographic operations - such as decryption -encryption - signature generation - and signature verification.
firewalking
asynchronous transmission
Cryptographic Key
Authentication
4. A limit on the amount of time or number of iterations or transmissions in computer and network technology a packet can experience before it will be discarded.
Time To Live (TTL)
Google hacking
CAM table
Transport Layer Security (TLS)
5. 1. The path a packet travels to reach the intended destination. Each individual device along the path traveled is called a hop. 2. Information contained on a device containing instructions for reaching other nodes on the network. This information can
route
replay attack
red team
Directory Traversal
6. The process of transforming ciphertext into plaintext through the use of a cryptographic algorithm.
Access Point (AP)
Information Technology (IT) asset valuation
-PT
Decryption
7. A tool that helps a company to compare its actual performance with its potential performance.
Port Address Translation (PAT)
gap analysis
Packet Internet Groper (ping)
sheepdip
8. A Windows-based GUI version of nmap.
single loss expectancy (SLE)
-oA
risk
Zenmap
9. Physical socket provided on routers and switches for cable connections between a computer and the router/switch. This connection enables the computer to configure - query - and troubleshoot the router/switch by use of a terminal emulator and a comman
Vulnerability Management
-oA
parallel scan & 300 sec timeout & 1.25 sec/probe
Console Port
10. A security protocol for wireless local area networks defined in the 802.11b standard; intended to provide the same level of security as a wired LAN. WEP is not considered strong security - although it does authenticate clients to access points - encr
symmetric algorithm
Authorization
Wired Equivalent Privacy (WEP)
integrity
11. A host designed to collect data on suspicious activity.
honeypot
Secure Multipurpose Mail Extension (S/MIME)
Bluejacking
War Chalking
12. A penetration test in which the ethical hacker has limited knowledge of the intended target(s). Designed to simulate an internal - but non-systemadministrator-level attack.
forwarding
gray box testing
Challenge Handshake Authentication Protocol (CHAP)
enumeration
13. An extensible mechanism for e-mail. A variety of MIME types exist for sending content such as audio - binary - or video using the Simple Mail Transfer Protocol (SMTP).
asynchronous transmission
Serial Line Internet Protocol (SLIP)
Information Technology (IT) security architecture and framework
Multipurpose Internet Mail Extensions (MIME)
14. An attack that combines a brute-force attack with a dictionary attack.
Level III assessment
SAM
hybrid attack
-PT
15. ICMP Type/Code 3-13
Administratively Prohibited
piggybacking
INFOSEC Assessment Methodology (IAM)
Wi-Fi Protected Access (WPA)
16. A card with a built-in microprocessor and memory used for identification or financial transactions. The card transfers data to and from a central computer when inserted into a reader.
Blowfish
smart card
Assessment
Vulnerability Assessment
17. A computer system that performs tasks dictated by an attacker from a remote location. Zombies may be active or idle - and owners of the systems generally do not know their systems are compromised.
Interior Gateway Protocol (IGP)
network interface card (NIC)
sheepdip
Zombie
18. Black box test
No previous knowledge of the network
false rejection rate (FRR)
replay attack
passive attack
19. Security measures - such as a locked door - perimeter fence - or security guard - to prevent or deter physical access to a facility - resource - or information stored on physical media.
physical security
Acceptable Use Policy (AUP)
hashing algorithm
Digital Signature
20. A standard that provides best-practice recommendations on information security management for use by those responsible for initiating - implementing - or maintaining Information Security Management Systems (ISMS). Information security is defined with
ISO 17799
Backdoor
Internet Assigned Number Authority (IANA)
RID Resource identifier
21. Metamorphic Virus
role-based access control
Self Replicating
-sI
segment
22. Shifting responsibility from one party to another
risk transference
Syslog
public key infrastructure (PKI)
-sL
23. A communications channel that is being used for a purpose it was not intended for - usually to transfer information secretly.
Covert Channel
security defect
Digital Certificate
FTP
24. Window Scan
shoulder surfing
Certificate Authority (CA)
hybrid attack
-sW
25. A network architecture framework developed by ISO that describes the communications process between two systems across the Internet in seven distinct layers.
Open System Interconnection (OSI) Reference Model
Bit Flipping
Virus
stateful packet filtering
26. An outdated symmetric cipher encryption algorithm - previously U.S. government-approved and used by business and civilian government agencies. DES is no longer considered secure due to the ease with which the entire keyspace can be attempted using mo
Data Encryption Standard (DES)
Buffer
GET
private key
27. A method of evaluating the security of a computer system or network by simulating an attack from a malicious source.
network access server
-PM
SNMP
penetration testing
28. Looking over an authorized user's shoulder in order to steal information (such as authentication information).
port redirection
shoulder surfing
parameter tampering
qualitative analysis
29. A condition that occurs when more data is written to a buffer than it has space to store - and results in data corruption or other system errors. This is usually due to insufficient bounds checking - a bug - or improper configuration in the program c
encryption
rogue access point
Buffer Overflow
-sO
30. A record showing which user has accessed a given resource and what operations the user performed during a given period.
Audit Trail
iris scanner
Destination Unreachable
Traceroute
31. The process of determining if a network entity (user or service) is legitimate
Algorithm
Ethical Hacker
remote procedure call (RPC)
Authentication
32. A wireless networking mode where all clients connect to the wireless network through a central access point.
Authorization
Computer-Based Attack
infrastructure mode
Vulnerability
33. A sublayer of layer 2 of the OSI model - the Data Link layer. It provides addressing and channel access control mechanisms that enable several terminals or network nodes to communicate within a multipoint network.
Exploit
Media Access Control (MAC)
forwarding
Wi-Fi Protected Access (WPA)
34. A protocol that uses a private key to encrypt data before transmitting confidential documents over the Internet; widely used on e-commerce - banking - and other sites requiring privacy.
patch
Secure Sockets Layer (SSL)
Information Technology (IT) security architecture and framework
smart card
35. Monitoring of telephone or Internet conversations - typically by covert means.
firewall
ad hoc mode
Wiretapping
Wired Equivalent Privacy (WEP)
36. A free and popular version of the Unix operating system.
Cookie
Zenmap
Anonymizer
FreeBSD
37. An API that provides services related to the OSI model's Session layer - allowing applications on separate computers to communicate over a LAN.
network interface card (NIC)
Challenge Handshake Authentication Protocol (CHAP)
Point-to-Point Protocol (PPP)
Network Basic Input/Output System (NetBIOS)
38. ICMP Ping
spam
Eavesdropping
Wireless Local Area Network (WLAN)
-PI
39. The use of deceptive computer-based means to trick individuals into disclosing sensitive personal information
Collision Domain
security by obscurity
phishing
passive attack
40. An e-mail message warning users of a nonexistent virus and encouraging them to pass on the message to other users.
Virus Hoax
Hypertext Transfer Protocol Secure (HTTPS)
honeynet
-PP
41. A value assigned to uniquely identify a single wide area network (WAN) in wireless LANs. SSIDs are broadcast by default - and are sent in the header of every packet. SSIDs provide no encryption or security.
Service Set Identifier (SSID)
risk acceptance
Countermeasures
Daisy Chaining
42. A software license agreement; a contract between the 'licensor' and purchaser establishing the right to use the software.
End User Licensing Agreement (EULA)
Three-Way (TCP) Handshake
Traceroute
Overwhelm CAM table to convert switch to hub mode
43. Black hat
Hacks without permission
asynchronous transmission
Trusted Computer System Evaluation Criteria (TCSEC)
GET
44. Any network incident that prompts some kind of log entry or other notification.
Domain Name System (DNS)
Finding a directory listing and gaining access to a parent or root file for access to other files
Auditing
Event
45. ICMP Type/Code 8
Echo request
SID
Google hacking
Bluesnarfing
46. A protocol for exchanging packets over a serial line.
Serial Line Internet Protocol (SLIP)
Client
Active Attack
Asynchronous
47. Port 110
POP 3
Filter
Back orifice
remote procedure call (RPC)
48. A list of IP addresses and corresponding MAC addresses stored on a local computer.
spam
Address Resolution Protocol (ARP) table
Trojan Horse
Domain Name System (DNS) lookup
49. Two or more LANs connected by a high-speed line across a large geographical area.
Administratively Prohibited
Wide Area Network (WAN)
Droppers
net use \[target ip]IPC$ '' /user:''
50. The level of importance assigned to an IT asset
Trapdoor Function
Bluejacking
Information Technology (IT) asset criticality
Mandatory access control (MAC)
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests