SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A piece of software - provided by the vendor - intended to update or fix known - discovered problems in a computer program or its supporting data.
patch
Droppers
Rijndael
Adware
2. Method used by antivirus software to detect new - unknown viruses that have not yet been identified; based on a piece-by-piece examination of a program - looking for a sequence or sequences of instructions that differentiate the virus from 'normal' p
Malicious code
Google hacking
Back orifice
heuristic scanning
3. Start of Authority record. This record identifies the primary name server for the zone. The SOA record contains the host name of the server responsible for all DNS records within the namespace - as well as the basic properties of the domain.
SOA record
Detective Controls
Crossover Error Rate (CER)
RPC-DCOM
4. Host-based IDS. An IDS that resides on the host - protecting against file and folder manipulation and other host-based attacks and actions.
HIDS
passive attack
Ciphertext
--randomize_hosts -O OS fingerprinting
5. Malicious code that uses a polymorphic engine to mutate while keeping the original algorithm intact; the code changes itself each time it runs - but the function of the code will not change.
NetBus
Application-Level Attacks
session splicing
polymorphic virus
6. A tool that helps a company to compare its actual performance with its potential performance.
Time To Live (TTL)
Secure Sockets Layer (SSL)
smart card
gap analysis
7. The monetary value expected from the occurrence of a risk on an asset. It is mathematically expressed as single loss expectancy (SLE) = asset value (AV)
Master boot record infector
net use \[target ip]IPC$ '' /user:''
single loss expectancy (SLE)
Hacks with permission
8. A group of penetration testers that assess the security of an organization - which is often unaware of the existence of the team or the exact assignment.
red team
-sT
Bastion host
Cookie
9. A unique hostname that is used to identify resources on the Internet. Domain names start with a root (.) - then add a top level (.com - .gov - or .mil - for example) - and a given name space.
Packet Internet Groper (ping)
Domain Name
Domain Name System (DNS) cache poisoning
Virtual Private Network (VPN)
10. A security tool designed to protect a system or network against attacks by comparing traffic patterns against a list of both known attack signatures and general characteristics of how attacks may be carried out. Threats are rated and reported.
intrusion detection system (IDS)
security breach or security incident
hash
Tunneling Virus
11. 18 U.S.C. 1030
Authentication - Authorization - and Accounting (AAA)
risk acceptance
-p <port ranges>
Fraud and related activity in connection with computers
12. A portion of memory used to temporarily store output or input data.
Buffer
symmetric encryption
Interior Gateway Protocol (IGP)
Redundant Array of Independent Disks (RAID)
13. RPC Scan
Information Technology Security Evaluation Criteria (ITSEC)
Denial of Service (DoS)
-sR
Multipurpose Internet Mail Extensions (MIME)
14. The central part of a computer or communications system hardware firmware - and software that implements the basic security procedures for controlling access to system resources.
security kernel
fragmentation
single loss expectancy (SLE)
null session
15. A piece of code intentionally inserted into a software system that will perform a malicious function when specified conditions are met at some future point.
logic bomb
Routing Protocol
Tiger Team
Point-to-Point Tunneling Protocol (PPTP)
16. A method for detecting malicious code on a computer where the files are compared to signatures of known viruses stored in a database.
Due Diligence
FTP
Virus Hoax
signature scanning
17. The last portion of the SID that identifies the user to the system in Windows. A RID of 500 identifies the administrator account.
proxy server
Daisy Chaining
Black Hat
RID Resource identifier
18. A widely used authentication protocol developed at the MassachusettsInstitute of Technology (MIT). Kerberos authentication uses tickets - Ticket Granting Service - and Key Distribution Center.
Kerberos
Fast Ethernet
forwarding
LDAP
19. The steps taken to gather evidence and information on the targets you wish to attack.
Back orifice
rootkit
Methodology
reconnaissance
20. An organization's threshold for the seven areas of information security responsibility. This level is established based on the objectives for maintaining confidentiality - integrity - and availability of the organization's IT assets and infrastructur
network tap
Tini
Minimum acceptable level of risk
Target Of Engagement (TOE)
21. A distance-vector routing protocol that employs the hop count as a routing metric. The 'hold down time -' used to define how long a route is held in memory - is 180 seconds. RIP prevents routing loops by implementing a limit on the number of hops all
Whois
Routing Information Protocol (RIP)
Algorithm
Point-to-Point Protocol (PPP)
22. An extensible mechanism for e-mail. A variety of MIME types exist for sending content such as audio - binary - or video using the Simple Mail Transfer Protocol (SMTP).
Multipurpose Internet Mail Extensions (MIME)
Due Care
Active Fingerprinting
Internal access to the network
23. The directory service created by Microsoft for use on itsnetworks. Provides a variety of network services using Lightweight Directory Access Protocol (LDAP) - Kerberos-based authentication - and single sign-on for user access to network-based resourc
Real application encompassing Trojan
operating system attack
Tunneling Virus
Active Directory (AD)
24. A device providing temporary - on-demand - point-to-point network access to users.
-sA
Information Technology (IT) asset valuation
risk assessment
network access server
25. A collection of historical records or the place where they are kept. In computing - an archive generally refers to backup copies of logs and/or data.
social engineering
shrink-wrap code attacks
Vulnerability Management
Archive
26. A file system used by the Mac OS.
Finding a directory listing and gaining access to a parent or root file for access to other files
Hierarchical File System (HFS)
Antivirus (AV) software
network interface card (NIC)
27. The science or study of protecting information - whether in transit or at rest - by using techniques to render the information unusable to anyone who does not possess the means to decrypt it.
Internal access to the network
Application-Level Attacks
Cryptography
sidejacking
28. A suite of protocols used for securing Internet Protocol (IP) communications by authenticating and encrypting each IP packet of a communication session. This suite includes protocols for establishing mutual authentication between agents at the sessio
sniffer
Internet Protocol Security (IPSec) architecture
Simple Network Management Protocol (SNMP)
Password Authentication Protocol (PAP)
29. The potential for damage to or loss of an IT asset
Simple Mail Transfer Protocol (SMTP)
risk
Extensible Authentication Protocol (EAP)
flood
30. Describes practices in production and development that promote access to the end product's source materials.
Application Layer
Macro virus
symmetric encryption
open source
31. An attack with the goal of preventing authorized users from accessing services and preventing the normal operation of computers and networks.
INFOSEC Assessment Methodology (IAM)
Certificate
Denial of Service (DoS)
Media Access Control (MAC)
32. A person or entity indirectly involved in a relationship between two principles.
Third Party
personal identification number (PIN)
Banner Grabbing
parameter tampering
33. A host designed to collect data on suspicious activity.
Bastion host
Packet Internet Groper (ping)
honeypot
private key
34. A communications channel that is being used for a purpose it was not intended for - usually to transfer information secretly.
parameter tampering
Covert Channel
Man-in-the-middle attack
Computer Emergency Response Team (CERT)
35. A legal limit on the amount of financial liability and remedies the organization is responsible for taking on.
Mandatory access control (MAC)
Temporal Key Integrity Protocol (TKIP)
Unicode
limitation of liability and remedies
36. The condition of a resource being ready for use and accessible by authorized users.
script kiddie
Transmission Control Protocol (TCP)
Availability
Algorithm
37. Port 22
-PM
Point-to-Point Protocol (PPP)
SSH
Digital Watermarking
38. An approach to restricting system access to authorized users in which roles are created for various job functions. The permissions to perform certain operations are assigned to specific roles. Members of staff (or other system users) are assigned par
Tumbling
Wide Area Network (WAN)
role-based access control
security controls
39. 1. The path a packet travels to reach the intended destination. Each individual device along the path traveled is called a hop. 2. Information contained on a device containing instructions for reaching other nodes on the network. This information can
stream cipher
Malware
route
Level I assessment
40. A proprietary - open - wireless technology used for transferring data from fixed and mobile devices over short distances.
Zero Subnet
Open System Interconnection (OSI) Reference Model
GET
Bluetooth
41. Hex 12
-sS
Request for Comments (RFC)
-sX
A S
42. Freely and readily available information on an organization that can be gathered by a business entity about its competitor's customers - products - and marketing - and can be used by an attacker to build useful information for further attacks.
Zenmap
Competitive Intelligence
footprinting
Countermeasures
43. An Internet routing protocol used to exchange routing information within an autonomous system.
Ethernet
Transport Layer Security (TLS)
Interior Gateway Protocol (IGP)
serial scan & 300 sec wait
44. A fully qualified domain name consists of a host and domain name - including a top-level domain such as .com - .net - .mil - .edu -and so on.
fully qualified domain name (FQDN)
Crossover Error Rate (CER)
security breach or security incident
-sP
45. A unit of information formatted according to specific protocols that allows precise transmittal of data from one network node to another. Also called a datagram or data packet - a packet contains a header (container) and a payload (contents). Any IP
404EE
packet
Network Address Translation (NAT)
Packet Internet Groper (ping)
46. Layer 2 of the OSI reference model. This layer provides reliable transit of data across a physical link. The Data Link layer is concerned with physical addressing - network topology - access to the network medium - error detection - sequential delive
Transport Layer Security (TLS)
Data Link layer
Certificate Authority (CA)
User Datagram Protocol (UDP)
47. A function that is easy to compute in one direction - yet believed to be difficult to compute in the opposite direction (finding its inverse) without special information - called the 'trapdoor.' Widely used in cryptography.
Back orifice
SSH
Trapdoor Function
out-of-band signaling
48. Phases of an attack
FTP
Vulnerability Scanning
Certificate
Reconnaissance - Scanning - Gaining Access - Maintaining Access - Covering Tracks
49. A small space having two sets of interlocking doors; the first set of doors must close before the second set opens. Typically authentication is required for each door - often using different factors. For example - a smart card may open the first door
protocol
Mantrap
network access server
Master boot record infector
50. A connectionless - layer 4 transport protocol. UDP is faster than TCP - but offers no reliability. A best effort is made to deliver the data - but no checks and verifications are performed to guarantee delivery. Therefore - UDP is termed a 'connectio
User Datagram Protocol (UDP)
A
Whois
Ethical Hacker