SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. In penetration testing - this is a method of testing the security of a system or subnet without any previous knowledge of the device or network. Designed to simulate an attack by an outside intruder (usually from the Internet).
Trojan Horse
Black Box Testing
Tiger Team
open source
2. The secret portion of an asymmetric key pair typically used to decrypt or digitally sign data. The private key is never shared and is always used for decryption - with one notable exception: The private key is used to encrypt the digital signature.
private key
Finding a directory listing and gaining access to a parent or root file for access to other files
Computer Emergency Response Team (CERT)
fragmentation
3. An evaluation conducted to determine the potential for damage to or loss of an IT asset.
Zone transfer
Dumpster Diving
risk assessment
Kerberos
4. A section or subset of the network. Often a router or other routing device provides the end point of the segment.
XOR Operation
router
segment
non-repudiation
5. Actions - devices - procedures - techniques - or other measures intended to reduce the vulnerability of an information system.
Media Access Control (MAC)
serialize scans & 15 sec wait
Countermeasures
Zombie
6. TCP SYN Scan
Directory Traversal
Zenmap
Level II assessment
-sS
7. Drawing symbols in public places to alert others to an open Wi-Fi network. War chalking can include the SSIDs - administrative passwords to APs - and other information.
reconnaissance
War Chalking
HIDS
packet
8. An extensible mechanism for e-mail. A variety of MIME types exist for sending content such as audio - binary - or video using the Simple Mail Transfer Protocol (SMTP).
Man-in-the-middle attack
Multipurpose Internet Mail Extensions (MIME)
security kernel
piggybacking
9. A symmetric - block-cipher data-encryption standard that uses a variablelength key that can range from 32 bits to 448 bits.
SOA record
Directory Traversal
Blowfish
Ethical Hacker
10. A unique numerical string - created by a hashing algorithm on a given piece of data - used to verify data integrity. Generally hashes are used to verify the integrity of files after download (comparison to the hash value on the site before download)
Cracker
Vulnerability
hash
Presentation layer
11. A method of falsely identifying the source of data packets; often used by hackers to make it difficult to trace where an attack originated.
A series of messages sent by someone attempting to break into a computer to learn about the computer's network services.
Audit Trail
steganography
spoofing
12. The process of using an application to remotely identify open ports on a system (for example - whether systems allow connections through those ports).
personal identification number (PIN)
Transmission Control Protocol (TCP)
Information Technology (IT) asset valuation
port scanning
13. The process of attaching a particular protocol header and trailer to a unit of data before transmission on the network. Occurs at layer 2 of the OSI reference model.
encapsulation
Virus Hoax
International Organization for Standardization (ISO)
Minimum acceptable level of risk
14. ICMP Type/Code 3-13
SYN attack
Administratively Prohibited
Whois
Three-Way (TCP) Handshake
15. Port 31337
Back orifice
Master boot record infector
SMB
Competitive Intelligence
16. A firewall evasion technique whereby packets are wrapped in HTTP - as a covert channel to the target.
HTTP tunneling
Redundant Array of Independent Disks (RAID)
No previous knowledge of the network
ad hoc mode
17. Content Addressable Memory table. Holds all the MAC-address-to-port mappings on a switch.
CAM table
Zone transfer
SOA record
non-repudiation
18. Authentication confirms the identity of the user or device. Authorization determines the privileges (rights) of the user or device. Accounting records the access attempts - both successful and unsuccessful.
Authentication - Authorization - and Accounting (AAA)
Methodology
Address Resolution Protocol (ARP)
spyware
19. A routing protocol developed to be used within a single organization.
Port Address Translation (PAT)
Domain Name System (DNS) cache poisoning
Interior Gateway Protocol (IGP)
-oX
20. One or more locations from which control is exercised over a computer - television broadcast - or telecommunications network.
Directory Traversal
network operations center (NOC)
halo effect
U P F
21. The security property that data is not modified in an unauthorized and undetected manner. Also - the principle and measures taken to ensure that data received is in the exact same condition and state as when it was originally transmitted.
reconnaissance
Discretionary Access Control (DAC)
Fraud and related activity in connection with computers
integrity
22. A class of algorithms for cryptography that use the same cryptographic key for both decryption and encryption.
session hijacking
hashing algorithm
Information Technology (IT) security architecture and framework
symmetric algorithm
23. An anonymous connection to an administrative share (IPC$) on a Windows machine. Null sessions allow for enumeration of Windows machines - among other attacks.
parallel scan & 300 sec timeout & 1.25 sec/probe
null session
Ethernet
Warm Site
24. Looking over an authorized user's shoulder in order to steal information (such as authentication information).
Zombie
Zenmap
signature scanning
shoulder surfing
25. Port 80/81/8080
Internet Protocol Security (IPSec) architecture
security kernel
HTTP
SAM
26. Aggressive scan timing
parallel scan & 300 sec timeout & 1.25 sec/probe
public key
rootkit
routed protocol
27. A software or hardware defect that often results in system vulnerabilities.
Vulnerability Management
POP 3
Ethernet
Bug
28. Management policy and procedures designed to maintain or restore business operations - including computer operations - possibly at an alternate location - in the event of emergencies - system failures - or disaster.
-sV
Secure Multipurpose Mail Extension (S/MIME)
Contingency Plan
network interface card (NIC)
29. An Application layer protocol for managing devices on an IP network.
Simple Network Management Protocol (SNMP)
SSH
FTP
Boot Sector Virus
30. An evaluation consisting of a document review - interviews - and demonstrations. No hands-on testing is performed.
Bluesnarfing
symmetric encryption
parallel scan & 300 sec timeout & 1.25 sec/probe
Level I assessment
31. A simple PPP authentication mechanism in which the user name and password are transmitted in clear text to prove identity. PAP compares the user name and password to a table listing authorized users.
International Organization for Standardization (ISO)
Application-Level Attacks
Mandatory access control (MAC)
Password Authentication Protocol (PAP)
32. A social-engineering attack using computer resources - such as e-mail or IRC.
RxBoot
Computer-Based Attack
Information Technology (IT) asset criticality
honeypot
33. The process of transforming ciphertext into plaintext through the use of a cryptographic algorithm.
encryption
protocol
Authorization
Decryption
34. Wrapper or Binder
security incident response team (SIRT)
Domain Name System (DNS) cache poisoning
-PT
Real application encompassing Trojan
35. A partially protected zone on a network - not exposed to the full fury of the Internet - but not fully behind the firewall. This technique is typically used on parts of the network that must remain open to the public (such as a web server) but must a
404EE
Virtual Private Network (VPN)
Demilitarized Zone (DMZ)
Network Basic Input/Output System (NetBIOS)
36. A unique hostname that is used to identify resources on the Internet. Domain names start with a root (.) - then add a top level (.com - .gov - or .mil - for example) - and a given name space.
Domain Name
Acknowledgment (ACK)
Authentication - Authorization - and Accounting (AAA)
suicide hacker
37. An inspection of a place where a company or individual proposes to work - to gather the necessary information for a design or risk assessment.
Replacing numbers in a url to access other files
Electronic Code Book (ECB)
route
site survey
38. Formal description and evaluation of the vulnerabilities in an information system
serial scan & 300 sec wait
Network Basic Input/Output System (NetBIOS)
Vulnerability Assessment
RID Resource identifier
39. An organized collection of data.
Database
NetBSD
Daemon
Domain Name System (DNS) cache poisoning
40. The concept of having more than one person required to complete a task
Syslog
Countermeasures
separation of duties
Trojan Horse
41. Weakness in an information system - system security procedures - internal controls - or implementation that could be exploited or triggered by a threat source.
A procedure for identifying active hosts on a network.
Access Point (AP)
rogue access point
Vulnerability
42. A type of attack used to deny service to legitimate users of a network resource by intentionally overloading the network with illegitimate TCP connection requests. SYN packets are sent repeatedly to the target - but the corresponding SYN/ACK response
public key
Vulnerability Management
SYN flood attack
patch
43. Self-contained network with a limited number of participants who extend limited trust to one another in order to accomplish an agreed-upon goal.
Algorithm
Anonymizer
intranet
Possession of access devices
44. A limit on the amount of time or number of iterations or transmissions in computer and network technology a packet can experience before it will be discarded.
Finger
reverse social engineering
Time To Live (TTL)
FreeBSD
45. An Application layer protocol used primarily by Microsoft Windows to provide shared access to printers - files - and serial ports. It also provides an authenticated interprocess communication mechanism.
Serial Line Internet Protocol (SLIP)
DNS
Common Internet File System/Server Message Block
Time To Live (TTL)
46. An industry standard protocol used for accessing and managing information within a directory service; an application protocol for querying and modifying data using directory services running over TCP/IP.
SMB
ECHO reply
Lightweight Directory Access Protocol (LDAP)
Methodology
47. The act of searching for Wi-Fi wireless networks by a person in a moving vehicle - using a portable device.
SSH
reverse lookup; reverse DNS lookup
SAM
War Driving
48. Attacks on the actual programming code of an application.
Zombie
Application-Level Attacks
impersonation
-PB
49. A penetration test in which the ethical hacker has limited knowledge of the intended target(s). Designed to simulate an internal - but non-systemadministrator-level attack.
CIA triangle
802.11 i
gray box testing
-sS
50. TCP Ping
Electronic serial number
-PT
MAC filtering
Virus Hoax