SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. As an identification device becomes more sensitive or accurate - its FAR decreases while its FRR increases. The CER is the point at which these two rates are equal - or cross over.
security controls
key exchange protocol
hashing algorithm
false rejection rate (FRR)
2. A device that receives and sends data packets between two or more networks; the packet headers and a forwarding table provide the router with the information necessary for deciding which interface to use to forward packets.
-sP
POST
intrusion detection system (IDS)
router
3. An Application layer protocol used primarily by Microsoft Windows to provide shared access to printers - files - and serial ports. It also provides an authenticated interprocess communication mechanism.
security breach or security incident
Packet Internet Groper (ping)
Common Internet File System/Server Message Block
false rejection rate (FRR)
4. A security protocol for wireless local area networks defined in the 802.11b standard; intended to provide the same level of security as a wired LAN. WEP is not considered strong security - although it does authenticate clients to access points - encr
Level III assessment
Antivirus (AV) software
-PI
Wired Equivalent Privacy (WEP)
5. One or more locations from which control is exercised over a computer - television broadcast - or telecommunications network.
network operations center (NOC)
SNMP
Open System Interconnection (OSI) Reference Model
SOA record
6. A computer file system architecture used in Windows - OS/2 - and most memory cards.
Brute-Force Password Attack
Wrapper
File Allocation Table (FAT)
-oX
7. The process of recording activity on a system for monitoring and later review.
Serial Line Internet Protocol (SLIP)
Auditing
out-of-band signaling
fully qualified domain name (FQDN)
8. An informed decision to accept the potential for damage to or loss of an IT asset.
Routing Protocol
risk acceptance
Information Technology Security Evaluation Criteria (ITSEC)
Request for Comments (RFC)
9. ICMP Netmask
-PM
Finding a directory listing and gaining access to a parent or root file for access to other files
quantitative risk assessment
802.11
10. Controls to detect anomalies or undesirable events occurring on a system.
Detective Controls
patch
Active Fingerprinting
Wrapper
11. A wireless LAN device that acts as a central point for all wireless traffic. The AP is connected to both the wireless LAN and the wired LAN - providing wireless clients access to network resources.
Wi-Fi
Access Point (AP)
Destination Unreachable
Collision
12. Self-contained network with a limited number of participants who extend limited trust to one another in order to accomplish an agreed-upon goal.
intranet
Address Resolution Protocol (ARP)
Asymmetric Algorithm
Collision Domain
13. A free and popular version of the Unix operating system.
protocol stack
FreeBSD
shoulder surfing
Virus Hoax
14. Paranoid scan timing
Password Authentication Protocol (PAP)
Data Encryption Standard (DES)
personal identification number (PIN)
serial scan & 300 sec wait
15. A standard for encrypting e-mail - web pages - and other stream-oriented information transmitted over the Internet.
Data Encryption Standard (DES)
Application Layer
Transport Layer Security (TLS)
Malware
16. A Unix-like computer operating system descending from the BSD. Open-BSD includes a number of security features absent or optional in other operating systems.
OpenBSD
-oA
NT LAN Manager (NTLM)
Level III assessment
17. A simple PPP authentication mechanism in which the user name and password are transmitted in clear text to prove identity. PAP compares the user name and password to a table listing authorized users.
Client
Address Resolution Protocol (ARP) table
Password Authentication Protocol (PAP)
rogue access point
18. A piece of code intentionally inserted into a software system that will perform a malicious function when specified conditions are met at some future point.
logic bomb
Replacing numbers in a url to access other files
polymorphic virus
Active Directory (AD)
19. Aggressive scan timing
-oN
parallel scan & 300 sec timeout & 1.25 sec/probe
hash
The automated process of proactively identifying vulnerabilities of computing systems present in a network
20. Actions - devices - procedures - techniques - or other measures intended to reduce the vulnerability of an information system.
Acknowledgment (ACK)
Simple Network Management Protocol (SNMP)
DNS
Countermeasures
21. Shifting responsibility from one party to another
security breach or security incident
risk transference
risk assessment
NetBus
22. Provides data encryption for IEEE 802.11 wireless networks so data can only be decrypted by the intended recipients.
Certificate Authority (CA)
Ciphertext
Wi-Fi Protected Access (WPA)
gray hat
23. Safeguards or countermeasures to avoid - counteract - or minimize security risks.
gray box testing
suicide hacker
Database
security controls
24. A set of exclusive rights granted by the law of a jurisdiction to the author or creator of an original work - including the right to copy - distribute - and adapt the work.
Interior Gateway Protocol (IGP)
Dumpster Diving
Copyright
Tiger Team
25. A method for detecting malicious code on a computer where the files are compared to signatures of known viruses stored in a database.
Application Layer
SOA record
-sF
signature scanning
26. Any network incident that prompts some kind of log entry or other notification.
Information Technology (IT) infrastructure
Authorization
session splicing
Event
27. A Windows-based GUI version of nmap.
Zenmap
out-of-band signaling
Database
Zombie
28. Microsoft SID 500
Local Administrator
Computer Emergency Response Team (CERT)
-sO
Wireless Local Area Network (WLAN)
29. A security tool designed to protect a system or network against attacks by comparing traffic patterns against a list of both known attack signatures and general characteristics of how attacks may be carried out. Threats are rated and reported.
single loss expectancy (SLE)
Google hacking
SAM
intrusion detection system (IDS)
30. Content Addressable Memory table. Holds all the MAC-address-to-port mappings on a switch.
CAM table
symmetric algorithm
patch
Ethical Hacker
31. Physical socket provided on routers and switches for cable connections between a computer and the router/switch. This connection enables the computer to configure - query - and troubleshoot the router/switch by use of a terminal emulator and a comman
Console Port
logic bomb
qualitative analysis
Internet service provider (ISP)
32. An enumeration technique used to provide information about a computer system; generally used for operating system identification (also known as fingerprinting).
Banner Grabbing
INFOSEC Assessment Methodology (IAM)
Level I assessment
qualitative analysis
33. A hybrid of the HTTP and SSL/TLS protocols that provides encrypted communication and secure identification of a web server.
Hypertext Transfer Protocol Secure (HTTPS)
segment
Whois
Internet Protocol Security (IPSec) architecture
34. Chronological record of system activities to enable the reconstruction and examination of the sequence of events and changes in an event.
Black Hat
Audit Data
Droppers
shrink-wrap code attacks
35. Window Scan
-sW
Auditing
-sL
The automated process of proactively identifying vulnerabilities of computing systems present in a network
36. In a classful IPv4 subnet - this is the network number with all binary 0s in the subnet part of the number. When written in decimal - the zero subnet has the same number as the classful network number.
Cracker
Information Technology (IT) asset valuation
Corrective Controls
Zero Subnet
37. Injecting traffic into the network to identify the operating system of a device.
Routing Protocol
Active Fingerprinting
Hypertext Transfer Protocol (HTTP)
Access Control List (ACL)
38. A legal limit on the amount of financial liability and remedies the organization is responsible for taking on.
Mandatory access control (MAC)
Community String
Point-to-Point Protocol (PPP)
limitation of liability and remedies
39. A secret - typically consisting of only decimal digits - that a claimant memorizes and uses to authenticate his identity
personal identification number (PIN)
-oG
Trapdoor Function
audit
40. Any kind of connection that allows you to see all traffic passing by. Generally used in reference to a NIDS (network-based IDS) to monitor all traffic.
network tap
Decryption
Multipartite virus
Web Spider
41. A program designed to browse websites in an automated - methodical manner. Sometimes these programs are used to harvest information from websites - such as e-mail addresses.
Web Spider
Availability
Traceroute
False Acceptance Rate (FAR)
42. A protocol used for sending and receiving log information for nodes on a network.
Virtual Local Area Network (VLAN)
Three-Way (TCP) Handshake
separation of duties
Syslog
43. An international encoding standard - working within multiple languages and scripts - that represents each letter - digit - or symbol with a unique numeric value that applies across different platforms.
-PP
Unicode
Acceptable Use Policy (AUP)
Vulnerability Scanning
44. An Application layer protocol for managing devices on an IP network.
Simple Network Management Protocol (SNMP)
Sign in Seal
Reconnaissance - Scanning - Gaining Access - Maintaining Access - Covering Tracks
CNAME record
45. A cell phone attack in which the serial number from one cell phone is copied to another in an effort to copy the cell phone.
service level agreements (SLAs)
Hacks without permission
serialize scans & 15 sec wait
Cloning
46. An application that monitors a computer or network to identify - and prevent - malware. AV is usually signature-based - and can take multiple actions on defined malware files/activity.
SNMP
Antivirus (AV) software
personal identification number (PIN)
SOA record
47. Xmas Tree scan
Information Technology (IT) infrastructure
-sX
node
-sT
48. The process of systematically testing each port on a firewall to map rules and determine accessible ports.
firewalking
Block Cipher
quality of service (QoS)
logic bomb
49. Layer 6 of the OSI reference model. The Presentation layer ensures information sent by the Application layer of the sending system will be readable by the Application layer of the receiving system.
Zero Subnet
Presentation layer
A procedure for identifying active hosts on a network.
Contingency Plan
50. The process of sending a packet or frame toward the destination. In a switch - messages are forwarded only to the port they are addressed to.
forwarding
impersonation
Zenmap
Telnet
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests