SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Hex 12
LDAP
Secure Sockets Layer (SSL)
A S
Wi-Fi Protected Access (WPA)
2. A method in cryptography by which cryptographic keys are exchanged between users - allowing use of a cryptographic algorithm (for example - the Diffie-Hellman key exchange).
Wi-Fi
key exchange protocol
network tap
Boot Sector Virus
3. A networking configuration where all nodes are connected in a circle with no terminated ends on the cable.
HTTP tunneling
ring topology
HTTP
Level I assessment
4. A virus designed to infect the master boot record.
Master boot record infector
scope creep
intranet
S
5. A communications channel that is being used for a purpose it was not intended for - usually to transfer information secretly.
A procedure for identifying active hosts on a network.
Certificate
Covert Channel
National Security Agency
6. A trusted entity that issues and revokes public key certificates. In a network - a CA is a trusted entity that issues - manages - and revokes security credentials and public keys for message encryption and/or authentication. Within a public key infra
Echo Reply
Transport Layer Security (TLS)
Certificate Authority (CA)
R
7. White box test
Event
Cache
Ciphertext
Internal access to the network
8. CAN-SPAM
Defines legal email marketing
NetBus
Collision
-sV
9. An environmentally conditioned workspace partially equipped with IT and telecommunications equipment to support relocated IT operations in the event of a significant disruption.
asynchronous transmission
Malware
-oG
Warm Site
10. ICMP Ping
scope creep
ISO 17799
-PI
HTTP
11. An attack where the hacker manipulates parameters within the URL string in hopes of modifying data.
security bulletins
Vulnerability Management
proxy server
parameter tampering
12. An information assurance strategy in which multiple layers of defense are placed throughout an Information Technology system.
Possession of access devices
Secure Multipurpose Mail Extension (S/MIME)
Defense in Depth
false rejection rate (FRR)
13. A small Trojan program that listens on port 777.
Cracker
Tini
ping sweep
Tumbling
14. Weakness in an information system - system security procedures - internal controls - or implementation that could be exploited or triggered by a threat source.
INFOSEC Assessment Methodology (IAM)
File Allocation Table (FAT)
LDAP
Vulnerability
15. UDP Scan
CIA triangle
quantitative risk assessment
Exposure Factor
-sU
16. Port 389
RID Resource identifier
Minimum acceptable level of risk
role-based access control
LDAP
17. Authentication confirms the identity of the user or device. Authorization determines the privileges (rights) of the user or device. Accounting records the access attempts - both successful and unsuccessful.
Bug
-sI
Active Attack
Authentication - Authorization - and Accounting (AAA)
18. An attacker who breaks into computer systems with malicious intent - without the owner's knowledge or permission.
Routing Information Protocol (RIP)
impersonation
Black Hat
flood
19. Any kind of connection that allows you to see all traffic passing by. Generally used in reference to a NIDS (network-based IDS) to monitor all traffic.
Certificate
pattern matching
Wrapper
network tap
20. A social-engineering effort in which the attacker pretends to be an employee - a valid user - or even an executive to elicit information or access.
Challenge Handshake Authentication Protocol (CHAP)
impersonation
DNS
service level agreements (SLAs)
21. A fully operational off-site data-processing facility equipped with hardware and system software to be used in the event of a disaster.
Biometrics
hot site
Trusted Computer Base (TCB)
Banner Grabbing
22. The result of using a private key to encrypt a hash value for identification purposes within a PKI system. The signature can be decoded by the originator's public key - verifying his identity and providing non-repudiation. A valid digital signature g
serialize scans & 0.4 sec wait
Daemon
enumeration
Digital Signature
23. An extensible mechanism for e-mail. A variety of MIME types exist for sending content such as audio - binary - or video using the Simple Mail Transfer Protocol (SMTP).
Multipurpose Internet Mail Extensions (MIME)
Warm Site
SAM
router
24. An Application layer protocol used by local email clients to retrieve e-mail from a remote server over a TCP/IP connection.
script kiddie
Backdoor
Post Office Protocol 3 (POP3)
iris scanner
25. nmap all output
-oA
smart card
LDAP
Ciphertext
26. A host designed to collect data on suspicious activity.
script kiddie
honeypot
risk assessment
open source
27. Incremental Substitution
Replacing numbers in a url to access other files
Assessment
Database
security controls
28. ICMP Timestamp
reverse lookup; reverse DNS lookup
-PP
Baseline
Covert Channel
29. A three-step process computers execute to negotiate a connection with one another. The three steps are SYN - SYN/ACK - ACK.
Three-Way (TCP) Handshake
Secure Multipurpose Mail Extension (S/MIME)
File Allocation Table (FAT)
Tiger Team
30. TCP SYN Scan
-sS
Community String
A R
ISO 17799
31. Baseband LAN specification developed by Xerox Corporation - Intel - and Digital Equipment Corporation. One of the least expensive - most widely deployed networking standards; uses the CSMA/CD method of media access control.
NetBSD
Ethernet
-oA
Telnet
32. Any item of value or worth to an organization - whether physical or virtual.
Cloning
parameter tampering
Asset
Demilitarized Zone (DMZ)
33. A firewall evasion technique whereby packets are wrapped in HTTP - as a covert channel to the target.
shrink-wrap code attacks
Asynchronous
Whois
HTTP tunneling
34. Injecting traffic into the network to identify the operating system of a device.
Active Fingerprinting
RPC-DCOM
ISO 17799
quality of service (QoS)
35. Start of Authority record. This record identifies the primary name server for the zone. The SOA record contains the host name of the server responsible for all DNS records within the namespace - as well as the basic properties of the domain.
Daemon
public key infrastructure (PKI)
Assessment
SOA record
36. A condition that occurs when more data is written to a buffer than it has space to store - and results in data corruption or other system errors. This is usually due to insufficient bounds checking - a bug - or improper configuration in the program c
Buffer Overflow
-sT
local area network (LAN)
-b
37. Conversion of plaintext to ciphertext through the use of a cryptographic algorithm.
encryption
route
flood
R
38. The process of pinging each address within a subnet to map potential targets. Ping sweeps are unreliable and easily detectable - but very fast.
halo effect
Trojan Horse
Due Care
ping sweep
39. Also known as a public key certificate - this is an electronic file that is used to verify a user's identity - providing non-repudiation throughout the sys-tem. Certificates contain the entity's public key - serial number - version - subject - algori
audit
Digital Certificate
Authentication Header (AH)
Information Technology (IT) infrastructure
40. An API that provides services related to the OSI model's Session layer - allowing applications on separate computers to communicate over a LAN.
Vulnerability
Banner Grabbing
Access Creep
Network Basic Input/Output System (NetBIOS)
41. A method for detecting malicious code on a computer where the files are compared to signatures of known viruses stored in a database.
gap analysis
Authentication
signature scanning
U P F
42. Transmission using channels or frequencies outside those normally used for data transfer; often used for error reporting.
Time exceeded
packet
out-of-band signaling
Trusted Computer System Evaluation Criteria (TCSEC)
43. TCP connect() scan
Acceptable Use Policy (AUP)
S
-sT
Packet Internet Groper (ping)
44. Whether purposeful or the result of malware or other attack - a backdoor is a hidden capability in a system or program for bypassing normal computer authentication systems.
out-of-band signaling
private key
Web Spider
Backdoor
45. The monetary value expected from the occurrence of a risk on an asset. It is mathematically expressed as single loss expectancy (SLE) = asset value (AV)
Information Technology (IT) security architecture and framework
-p <port ranges>
Event
single loss expectancy (SLE)
46. A data encryption/decryption program often used for e-mail and file storage.
heuristic scanning
Event
War Chalking
Pretty Good Privacy (PGP)
47. A remote control program in which the client runs on a local computer and connects to a remote server on a network. Commands entered locally are executed on the remote system.
Telnet
private key
Level III assessment
Reconnaissance - Scanning - Gaining Access - Maintaining Access - Covering Tracks
48. Port 110
Trapdoor Function
Baseline
POP 3
reverse social engineering
49. A cyber attacker who acts without permission from - and gives prior notice to - the resource owner. Also known as a malicious hacker.
Tini
open source
risk transference
Cracker
50. A wireless LAN security standard developed by IEEE. Requires Temporal Key Integrity Protocol (TKIP) and Advanced Encryption Standard (AES).
RID Resource identifier
Digital Signature
802.11 i
public key
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests