SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Software or firmware intended to perform an unauthorized process that will have an adverse impact on the confidentiality - integrity - or availability of an information system. A virus - worm - Trojan horse - or other code-based entity that infects a
Malicious code
Boot Sector Virus
Community String
-sI
2. A TCP flag notifying an originating station that the preceding packet (or packets) has been received.
Electronic serial number
Acknowledgment (ACK)
Vulnerability Management
signature scanning
3. The process of embedding information into a digital signal in a way that makes it difficult to remove.
Sign in Seal
sheepdip
role-based access control
Digital Watermarking
4. The secret portion of an asymmetric key pair typically used to decrypt or digitally sign data. The private key is never shared and is always used for decryption - with one notable exception: The private key is used to encrypt the digital signature.
Due Diligence
private key
Event
Simple Object Access Protocol (SOAP)
5. ICMP Timestamp
National Security Agency
-PP
false negative
Cryptography
6. Occurs when authorized users accumulate excess privileges on a system due to moving from position to position.
White Box Testing
Wired Equivalent Privacy (WEP)
Virtual Private Network (VPN)
Access Creep
7. Freely and readily available information on an organization that can be gathered by a business entity about its competitor's customers - products - and marketing - and can be used by an attacker to build useful information for further attacks.
operating system attack
inference attack
Domain Name System (DNS) lookup
Competitive Intelligence
8. 1. The path a packet travels to reach the intended destination. Each individual device along the path traveled is called a hop. 2. Information contained on a device containing instructions for reaching other nodes on the network. This information can
route
War Chalking
router
False Acceptance Rate (FAR)
9. A self-replicating malicious program that attempts installation beneath antivirus software by directly intercepting the interrupt handlers of the operating system to evade detection.
packet filtering
Administratively Prohibited
Packet Internet Groper (ping)
Tunneling Virus
10. Ports 20/21
FTP
Request for Comments (RFC)
Internet Control Message Protocol (ICMP)
symmetric algorithm
11. An Application layer protocol - using TCP - for transporting files across an Internet connection. FTP transmits in clear text.
File Transfer Protocol (FTP)
Time exceeded
Blowfish
Banner Grabbing
12. Malware designed to install some sort of virus - backdoor - and so on - on a target system.
Network Address Translation (NAT)
Domain Name System (DNS)
-sL
Droppers
13. A symmetric - block-cipher data-encryption standard that uses a variablelength key that can range from 32 bits to 448 bits.
Blowfish
separation of duties
Cryptography
Copyright
14. Literally - 'not balanced or the same.' In computing - asymmetric refers to a difference in networking speeds upstream to downstream. In cryptography - it's the use of more than one key for encryption/authentication purposes.
Whois
Asymmetric
hashing algorithm
reverse lookup; reverse DNS lookup
15. A programming principle whereby the last piece of data added to the stack is the first piece of data taken off.
Finger
Simple Mail Transfer Protocol (SMTP)
Self Replicating
Last In First Out (LIFO)
16. A sublayer of layer 2 of the OSI model - the Data Link layer. It provides addressing and channel access control mechanisms that enable several terminals or network nodes to communicate within a multipoint network.
Media Access Control (MAC)
FTP
Temporal Key Integrity Protocol (TKIP)
encryption
17. A decision to reduce the potential for damage to or loss of an IT asset by taking some type of action
SSH
Time Bomb
risk avoidance
gap analysis
18. A malicious computer program with self-replication capabilities that attaches to another file and moves with the host from one computer to another.
Kerberos
Bug
Virus
replay attack
19. Aggressive scan timing
Ethical Hacker
Internet Control Message Protocol (ICMP)
parallel scan & 300 sec timeout & 1.25 sec/probe
Zombie
20. Evaluation in which testers attempt to penetrate the network.
Bug
Level III assessment
Asynchronous
Hierarchical File System (HFS)
21. Port 161/162
SNMP
infrastructure mode
quality of service (QoS)
nslookup
22. Directing a protocol from one port to another.
port redirection
-b
A series of messages sent by someone attempting to break into a computer to learn about the computer's network services.
Threat
23. A method of falsely identifying the source of data packets; often used by hackers to make it difficult to trace where an attack originated.
promiscuous mode
Bluejacking
R
spoofing
24. don't ping
footprinting
security controls
Electronic Code Book (ECB)
-P0
25. An API that provides services related to the OSI model's Session layer - allowing applications on separate computers to communicate over a LAN.
ring topology
-sS
source routing
Network Basic Input/Output System (NetBIOS)
26. 18 U.S.C. 1029
Possession of access devices
Videocipher II Satellite Encryption System
quality of service (QoS)
-PT
27. Black box test
War Dialing
Baseline
No previous knowledge of the network
Bug
28. Set of tools (applications or code) that enables administrator-level accessto a computer or computer network and is designed to obscure the fact that the system has been compromised. Rootkits are dangerous malware entities that provide administrator
rootkit
-sP
social engineering
Back orifice
29. ICMP Type/Code 3
ring topology
Destination Unreachable
Hypertext Transfer Protocol Secure (HTTPS)
SMB
30. The Security Accounts Manager file in Windows stores all the password hashes for the system.
honeypot
SAM
CAM table
public key
31. A nonnumerical - subjective risk evaluation. Used with qualitative assessment (an evaluation of risk that results in ratings of none - low - medium - and high for the probability.)
Secure Multipurpose Mail Extension (S/MIME)
honeynet
qualitative analysis
Internet service provider (ISP)
32. A social-engineering attack using computer resources - such as e-mail or IRC.
Computer-Based Attack
identity theft
Covert Channel
quality of service (QoS)
33. 18 U.S.C. 1030
SOA record
Authentication Header (AH)
Active Fingerprinting
Fraud and related activity in connection with computers
34. Phases of an attack
Authentication
Google hacking
Acceptable Use Policy (AUP)
Reconnaissance - Scanning - Gaining Access - Maintaining Access - Covering Tracks
35. Port 80/81/8080
routed protocol
HTTP
Corrective Controls
Bluejacking
36. A security tool designed to protect a system or network against attacks by comparing traffic patterns against a list of both known attack signatures and general characteristics of how attacks may be carried out. Threats are rated and protective measu
risk assessment
Defense in Depth
intrusion prevention system (IPS)
packet
37. LAN standard - defined by ANSI X3T9.5 - specifying a 100Mbps token-passing network using fiber-optic cable and a dualring architecture for redundancy - with transmission distances of up to two kilometers.
Fiber Distributed Data Interface (FDDI)
SYN flood attack
-oG
Replacing numbers in a url to access other files
38. ICMP Type/Code 11
NetBSD
protocol
Time exceeded
packet
39. IP Protocol Scan
null session
gray box testing
-sO
Availability
40. Also known as a digital certificate - this is an electronic file used to verify a user's identity - providing non-repudiation throughout the system It is also a set of data that uniquely identifies an entity. Certificates contain the entity's public
Certificate
Daemon
-oX
Pretty Good Privacy (PGP)
41. A software or hardware application or device that captures user keystrokes.
--randomize_hosts -O OS fingerprinting
keylogger
Eavesdropping
node
42. An organization's threshold for the seven areas of information security responsibility. This level is established based on the objectives for maintaining confidentiality - integrity - and availability of the organization's IT assets and infrastructur
security by obscurity
Asymmetric
Minimum acceptable level of risk
Algorithm
43. A three-step process computers execute to negotiate a connection with one another. The three steps are SYN - SYN/ACK - ACK.
Three-Way (TCP) Handshake
-sS
Kerberos
Challenge Handshake Authentication Protocol (CHAP)
44. A distance-vector routing protocol that employs the hop count as a routing metric. The 'hold down time -' used to define how long a route is held in memory - is 180 seconds. RIP prevents routing loops by implementing a limit on the number of hops all
Time Bomb
Routing Information Protocol (RIP)
Videocipher II Satellite Encryption System
gateway
45. The rate at which a biometric system will incorrectly identify an unauthorized individual and allow them access (see false negative).
Telnet
Wired Equivalent Privacy (WEP)
Event
False Acceptance Rate (FAR)
46. A suite of protocols used for securing Internet Protocol (IP) communications by authenticating and encrypting each IP packet of a communication session. This suite includes protocols for establishing mutual authentication between agents at the sessio
Internet Protocol Security (IPSec) architecture
Real application encompassing Trojan
Certificate
hot site
47. A record showing which user has accessed a given resource and what operations the user performed during a given period.
Audit Trail
network operations center (NOC)
-PI
A procedure for identifying active hosts on a network.
48. All measures and techniques taken to gather information about an intended target. Footprinting can be passive or active.
Fraud and related activity in connection with computers
out-of-band signaling
footprinting
Data Link layer
49. An outdated symmetric cipher encryption algorithm - previously U.S. government-approved and used by business and civilian government agencies. DES is no longer considered secure due to the ease with which the entire keyspace can be attempted using mo
-sW
Hypertext Transfer Protocol Secure (HTTPS)
Data Encryption Standard (DES)
honeynet
50. The process of using easily accessible DNS records to map a target network's internal hosts.
XOR Operation
DNS enumeration
-sO
shrink-wrap code attacks