SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A firewall evasion technique whereby packets are wrapped in HTTP - as a covert channel to the target.
HTTP tunneling
802.11
War Driving
rogue access point
2. Nmap grepable output
Wi-Fi
honeynet
reverse lookup; reverse DNS lookup
-oG
3. A unique numerical string - created by a hashing algorithm on a given piece of data - used to verify data integrity. Generally hashes are used to verify the integrity of files after download (comparison to the hash value on the site before download)
Videocipher II Satellite Encryption System
hash
Directory Traversal
LDAP
4. A command that instructs the system processor to do nothing. Many overflow attacks involve stringing several NOP operations together (known as a NOP sled).
End User Licensing Agreement (EULA)
Baseline
NOP
Rijndael
5. Monitoring of telephone or Internet conversations - typically by covert means.
Wiretapping
Biometrics
MAC filtering
Trusted Computer System Evaluation Criteria (TCSEC)
6. A TCP flag notifying an originating station that the preceding packet (or packets) has been received.
Wide Area Network (WAN)
rootkit
Acknowledgment (ACK)
Presentation layer
7. A limit on the amount of time or number of iterations or transmissions in computer and network technology a packet can experience before it will be discarded.
Time To Live (TTL)
Bit Flipping
penetration testing
Active Attack
8. A wireless access point that has either been installed on a secure company network without explicit authorization from a local network administrator - or has been created to allow a hacker to conduct a man-in-the-middle attack.
Tunneling Virus
rogue access point
reconnaissance
Annualized Loss Expectancy (ALE)
9. Two or more LANs connected by a high-speed line across a large geographical area.
MD5
RPC-DCOM
Wide Area Network (WAN)
Vulnerability Management
10. A mathematical operation requiring two binary inputs: If the inputs match - the output is a 0 - otherwise it is a 1.
XOR Operation
Echo request
non-repudiation
Tiger Team
11. A point of reference used to mark an initial state in order to manage change.
ping sweep
Hypertext Transfer Protocol (HTTP)
Telnet
Baseline
12. Access by information systems (or users) communicating from outside the information system security perimeter.
remote access
Mantrap
impersonation
-oG
13. A cryptographic attack where bits are manipulated in the ciphertext itself to generate a predictable outcome in the plaintext once it is decrypted.
Service Set Identifier (SSID)
security defect
shrink-wrap code attacks
Bit Flipping
14. An authentication method on point-to-point links - using a three-way handshake and a mutually agreed-upon key.
Zombie
Defense in Depth
Challenge Handshake Authentication Protocol (CHAP)
remote access
15. Literally - 'not balanced or the same.' In computing - asymmetric refers to a difference in networking speeds upstream to downstream. In cryptography - it's the use of more than one key for encryption/authentication purposes.
Presentation layer
Asymmetric
--randomize_hosts -O OS fingerprinting
-sO
16. Any network incident that prompts some kind of log entry or other notification.
Event
Dumpster Diving
-sI
Client
17. Host-based IDS. An IDS that resides on the host - protecting against file and folder manipulation and other host-based attacks and actions.
Internal access to the network
parallel scan & 300 sec timeout & 1.25 sec/probe
Annualized Loss Expectancy (ALE)
HIDS
18. An application that monitors a computer or network to identify - and prevent - malware. AV is usually signature-based - and can take multiple actions on defined malware files/activity.
Routing Information Protocol (RIP)
-P0
Tunneling Virus
Antivirus (AV) software
19. The rate at which a biometric system will incorrectly reject an access attempt by an authorized user.
802.11
halo effect
false rejection rate (FRR)
Time To Live (TTL)
20. A nontechnical method of hacking. Social engineering is the art of manipulating people - whether in person (human-based) or via computing methods (computer-based) - into providing sensitive information.
queue
Console Port
Wrapper
social engineering
21. Drawing symbols in public places to alert others to an open Wi-Fi network. War chalking can include the SSIDs - administrative passwords to APs - and other information.
War Chalking
segment
reverse lookup; reverse DNS lookup
-oG
22. A computer system that performs tasks dictated by an attacker from a remote location. Zombies may be active or idle - and owners of the systems generally do not know their systems are compromised.
Zombie
encapsulation
hybrid attack
Digital Watermarking
23. PI and PT Ping
security bulletins
Time To Live (TTL)
-PB
spyware
24. A three-step process computers execute to negotiate a connection with one another. The three steps are SYN - SYN/ACK - ACK.
Due Care
stream cipher
Three-Way (TCP) Handshake
HIDS
25. A protocol used for sending and receiving log information for nodes on a network.
intrusion prevention system (IPS)
Syslog
Mandatory access control (MAC)
DNS enumeration
26. The conveying of official access or legal power to a person or entity.
Authorization
Algorithm
honeynet
Black Hat
27. The basis of this kind of security is that an individual user - or program operating on the user's behalf - is allowed to specify explicitly the types of access other users (or programs executing on their behalf) may have to information under the use
false rejection rate (FRR)
parallel scan
Discretionary Access Control (DAC)
Vulnerability Scanning
28. A business - government agency - or educational institution that provides access to the Internet.
ad hoc mode
Hacks without permission
Internet service provider (ISP)
Buffer
29. A configuration of a network card that makes the card pass all traffic it receives to the central processing unit rather than just frames addressed to it
promiscuous mode
hacktivism
hardware keystroke logger
No previous knowledge of the network
30. A social-engineering attack that manipulates the victim into calling the attacker for help.
reverse social engineering
null session
smart card
Information Technology Security Evaluation Criteria (ITSEC)
31. An attack where the hacker positions himself between the client and the server - to intercept (and sometimes alter) data traveling between the two.
Man-in-the-middle attack
rule-based access control
polymorphic virus
quality of service (QoS)
32. ex 02
session hijacking
honeynet
Reconnaissance - Scanning - Gaining Access - Maintaining Access - Covering Tracks
S
33. A denial-of-service technique that uses numerous hosts to perform the attack.
Traceroute
protocol
Distributed DoS (DDoS)
A
34. Polite scan timing
serialize scans & 0.4 sec wait
Transmission Control Protocol (TCP)
Time To Live (TTL)
404EE
35. Any item of value or worth to an organization - whether physical or virtual.
Asset
Asynchronous
Covert Channel
Hacks with permission
36. All measures and techniques taken to gather information about an intended target. Footprinting can be passive or active.
footprinting
Bluejacking
private network address
Zone transfer
37. Incremental Substitution
Replacing numbers in a url to access other files
Exposure Factor
Trusted Computer System Evaluation Criteria (TCSEC)
Challenge Handshake Authentication Protocol (CHAP)
38. A method of permitting only MAC addresses in a preapproved list network access. Addresses not matching are blocked.
Media Access Control (MAC)
MAC filtering
Vulnerability
R
39. A backup facility with the electrical and physical components of a computer facility - but with no computer equipment in place. The site is ready to receive the necessary replacement computer equipment in the event the user has to move from his main
Domain Name System (DNS) lookup
Demilitarized Zone (DMZ)
Cold Site
Access Creep
40. Controls to detect anomalies or undesirable events occurring on a system.
port scanning
shoulder surfing
Bluejacking
Detective Controls
41. Security measures - such as a locked door - perimeter fence - or security guard - to prevent or deter physical access to a facility - resource - or information stored on physical media.
physical security
Rijndael
Extensible Authentication Protocol (EAP)
symmetric encryption
42. A wireless LAN security standard developed by IEEE. Requires Temporal Key Integrity Protocol (TKIP) and Advanced Encryption Standard (AES).
-PT
802.11 i
Three-Way (TCP) Handshake
Wi-Fi
43. An organized collection of data.
Database
Zero Subnet
Tunnel
--randomize_hosts -O OS fingerprinting
44. ICMP Type/Code 8
Active Directory (AD)
Echo request
Zombie
POST
45. A physical security attack where the attacker sifts through garbage and recycle bins for information that may be useful on current and future attacks
Simple Object Access Protocol (SOAP)
Trusted Computer System Evaluation Criteria (TCSEC)
Dumpster Diving
Active Fingerprinting
46. Baseband LAN specification developed by Xerox Corporation - Intel - and Digital Equipment Corporation. One of the least expensive - most widely deployed networking standards; uses the CSMA/CD method of media access control.
Ethernet
Uniform Resource Locator (URL)
stream cipher
serialize scans & 15 sec wait
47. The directory service created by Microsoft for use on itsnetworks. Provides a variety of network services using Lightweight Directory Access Protocol (LDAP) - Kerberos-based authentication - and single sign-on for user access to network-based resourc
Crossover Error Rate (CER)
Contingency Plan
Active Directory (AD)
-sA
48. A NAT method in which multiple internal hosts - using private IP addressing - can be mapped through a single public IP address using the session IDs and port numbers. An internal global IP address can support in excess of 65 -000 concurrent TCP and U
Port Address Translation (PAT)
Unicode
queue
Level I assessment
49. A type of attack used to deny service to legitimate users of a network resource by intentionally overloading the network with illegitimate TCP connection requests. SYN packets are sent repeatedly to the target - but the corresponding SYN/ACK response
NetBSD
SYN flood attack
protocol stack
Wiretapping
50. A computer placed outside a firewall to provide public services to other Internet sites - and hardened to resist external attacks.
Virus Hoax
reconnaissance
Bastion host
Electronic serial number