SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A three-step process computers execute to negotiate a connection with one another. The three steps are SYN - SYN/ACK - ACK.
Level II assessment
Three-Way (TCP) Handshake
Syslog
halo effect
2. Used for exchanging structured information - such as XML-based messages - in the implementation of web services
Simple Object Access Protocol (SOAP)
polymorphic virus
Demilitarized Zone (DMZ)
Network Address Translation (NAT)
3. An Internet routing protocol used to exchange routing information within an autonomous system.
MD5
Extensible Authentication Protocol (EAP)
Transport Layer Security (TLS)
Interior Gateway Protocol (IGP)
4. A virus written in a macro language and usually embedded in document or spreadsheet files.
Telnet
hardware keystroke logger
Macro virus
Tumbling
5. The transmission of digital signals without precise clocking or synchronization.
Self Replicating
asynchronous transmission
Overwhelm CAM table to convert switch to hub mode
Open System Interconnection (OSI) Reference Model
6. An Application layer protocol used primarily by Microsoft Windows to provide shared access to printers - files - and serial ports. It also provides an authenticated interprocess communication mechanism.
risk
security controls
Common Internet File System/Server Message Block
Antivirus (AV) software
7. The change or growth of a project's scope
scope creep
Smurf attack
protocol
802.11 i
8. The process of recording activity on a system for monitoring and later review.
route
Fiber Distributed Data Interface (FDDI)
HTTP tunneling
Auditing
9. The act of using numerous electronic serial numbers on a cell phone until a valid number is located.
serialize scans & 0.4 sec wait
Master boot record infector
Echo Reply
Tumbling
10. Safeguards or countermeasures to avoid - counteract - or minimize security risks.
Internet Control Message Protocol (ICMP)
rule-based access control
-oA
security controls
11. A security objective that ensures a resource can be accessed only by authorized users. This is also the property that sensitive information is not disclosed to unauthorized individuals - entities - or processes.
Active Fingerprinting
Real application encompassing Trojan
Institute of Electrical and Electronics Engineers (IEEE)
Confidentiality
12. A cell phone attack in which the serial number from one cell phone is copied to another in an effort to copy the cell phone.
Cloning
-sA
smart card
Trapdoor Function
13. A mode of operation for a block cipher - with the characteristic that each possible block of plaintext has a defined corresponding ciphertext value - and vice versa
Electronic Code Book (ECB)
Adware
footprinting
802.11
14. Any circumstance or event with the potential to adversely impact organizationaloperations - organizational assets - or individuals through an information system via unauthorized access - destruction - disclosure - modification of information - and/or
Daemon
Threat
War Driving
suicide hacker
15. An anonymous connection to an administrative share (IPC$) on a Windows machine. Null sessions allow for enumeration of Windows machines - among other attacks.
Zero Subnet
Mandatory access control (MAC)
gray box testing
null session
16. Hex 12
Database
self encrypting
Secure Multipurpose Mail Extension (S/MIME)
A S
17. ICMP Type/Code 3-13
Uniform Resource Locator (URL)
Ethical Hacker
POST
Administratively Prohibited
18. ICMP Ping
public key
-PI
route
Bluetooth
19. A term representing the responsibility managers and their organizations have to provide information security to ensure the type of control - the cost of control - and the deployment of control are appropriate for the system being managed.
Due Care
service level agreements (SLAs)
Mantrap
Whois
20. ACK Scan
Address Resolution Protocol (ARP) table
-sA
Internet Assigned Number Authority (IANA)
Biometrics
21. Port 161/162
Asymmetric Algorithm
SNMP
private network address
Warm Site
22. A network system of servers that translates numeric Internet Protocol (IP) addresses into human-friendly - hierarchical Internet addresses - and vice versa.
Domain Name System (DNS)
initial sequence number (ISN)
rule-based access control
Denial of Service (DoS)
23. A protocol used to pass control and error messages between nodes on the Internet.
sheepdip
Vulnerability
Back orifice
Internet Control Message Protocol (ICMP)
24. Any network incident that prompts some kind of log entry or other notification.
Bug
Event
Information Technology (IT) security architecture and framework
forwarding
25. Provides data encryption for IEEE 802.11 wireless networks so data can only be decrypted by the intended recipients.
Dumpster Diving
local area network (LAN)
Wi-Fi Protected Access (WPA)
SAM
26. A comparison metric for different biometric devices and technologies; the point at which the false acceptance rate (FAR) equals the
Virus
Crossover Error Rate (CER)
heuristic scanning
risk
27. An Internet Protocol Security (IPSec) header used to verify that the contents of a packet have not been modified while the packet was in transit.
Digital Watermarking
Antivirus (AV) software
Authentication Header (AH)
Certificate Authority (CA)
28. A technology where you advertise one IP address externally and data packets are rerouted to the appropriate IP address inside your network by a device providing translation services. In this way - IP addresses of machines on your internal network are
sniffer
Network Address Translation (NAT)
Zero Subnet
Presentation layer
29. Transmitting one protocol encapsulated inside another protocol.
Accountability
Tunneling
Information Technology (IT) asset valuation
Last In First Out (LIFO)
30. A proprietary - open - wireless technology used for transferring data from fixed and mobile devices over short distances.
Secure Multipurpose Mail Extension (S/MIME)
Bluetooth
Copyright
limitation of liability and remedies
31. An evaluation consisting of a document review - interviews - and demonstrations - as well as vulnerability scans and hands-on testing.
Level II assessment
Finding a directory listing and gaining access to a parent or root file for access to other files
A R
Possession of access devices
32. Start of Authority record. This record identifies the primary name server for the zone. The SOA record contains the host name of the server responsible for all DNS records within the namespace - as well as the basic properties of the domain.
gateway
Domain Name System (DNS)
SOA record
Black Box Testing
33. The potential for damage to or loss of an IT asset
Digital Watermarking
Application-Level Attacks
Kerberos
risk
34. The result of using a private key to encrypt a hash value for identification purposes within a PKI system. The signature can be decoded by the originator's public key - verifying his identity and providing non-repudiation. A valid digital signature g
Information Technology (IT) asset valuation
network operations center (NOC)
Real application encompassing Trojan
Digital Signature
35. A social-engineering attack that manipulates the victim into calling the attacker for help.
Rijndael
reverse social engineering
sniffer
Vulnerability
36. nmap
War Chalking
gap analysis
segment
-p <port ranges>
37. A software or hardware defect that often results in system vulnerabilities.
DNS enumeration
Asymmetric Algorithm
Bug
Lightweight Directory Access Protocol (LDAP)
38. A protocol that allows a client computer to request services from a server and the server to return the results.
Internet Assigned Number Authority (IANA)
Virus Hoax
personal identification number (PIN)
remote procedure call (RPC)
39. A unit of information formatted according to specific protocols that allows precise transmittal of data from one network node to another. Also called a datagram or data packet - a packet contains a header (container) and a payload (contents). Any IP
packet
Cryptographic Key
Threat
smart card
40. A free and popular version of the Unix operating system.
identity theft
Tunneling Virus
FreeBSD
enumeration
41. A protocol for transporting data packets across a packet switched internetwork (such as the Internet). IP is a routed protocol.
Internet Protocol (IP)
-PS
DNS
--randomize_hosts -O OS fingerprinting
42. An unknown deficiency in software or some other product that results in a security vulnerability being identified.
security defect
suicide hacker
Confidentiality
Packet Internet Groper (ping)
43. A record showing which user has accessed a given resource and what operations the user performed during a given period.
fragmentation
intranet
Trusted Computer System Evaluation Criteria (TCSEC)
Audit Trail
44. Using conversation or some other interaction between people to gather useful information.
HTTP
human-based social engineering
Malicious code
POP 3
45. An application that monitors a computer or network to identify - and prevent - malware. AV is usually signature-based - and can take multiple actions on defined malware files/activity.
iris scanner
Droppers
Antivirus (AV) software
Self Replicating
46. Text or data in its encrypted form; the result of plaintext being input into a cryptographic algorithm.
Data Encryption Standard (DES)
Ciphertext
Secure Sockets Layer (SSL)
Collision
47. A device that receives and sends data packets between two or more networks; the packet headers and a forwarding table provide the router with the information necessary for deciding which interface to use to forward packets.
Password Authentication Protocol (PAP)
Tumbling
router
Zone transfer
48. The lack of clocking (imposed time ordering) on a bit stream.
Asynchronous
Console Port
-PB
Methodology
49. A documented process for a procedure designed to be consistent - repeatable - and accountable.
serialize scans & 15 sec wait
Secure Sockets Layer (SSL)
Zenmap
Methodology
50. Describes practices in production and development that promote access to the end product's source materials.
open source
Internet Protocol (IP)
-sO
shrink-wrap code attacks
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests