SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A programming principle whereby the last piece of data added to the stack is the first piece of data taken off.
SMB
Last In First Out (LIFO)
port redirection
Wi-Fi
2. A network traffic management technique designed to allow applications to specify the route a packet will take to a destination - regardless of what the route tables between the two systems say.
spoofing
Internal access to the network
Defense in Depth
source routing
3. A card with a built-in microprocessor and memory used for identification or financial transactions. The card transfers data to and from a central computer when inserted into a reader.
security bulletins
router
Tumbling
smart card
4. A free - open source version of the Berkeley Software Distribution of Unix - often used in embedded systems.
Vulnerability Management
NetBSD
RID Resource identifier
Wi-Fi Protected Access (WPA)
5. Software or firmware intended to perform an unauthorized process that will have an adverse impact on the confidentiality - integrity - or availability of an information system. A virus - worm - Trojan horse - or other code-based entity that infects a
patch
local area network (LAN)
Malicious code
symmetric encryption
6. A type of encryption where the same key is used to encrypt and decrypt the message.
Information Technology (IT) security architecture and framework
honeypot
penetration testing
symmetric encryption
7. A unique numerical string - created by a hashing algorithm on a given piece of data - used to verify data integrity. Generally hashes are used to verify the integrity of files after download (comparison to the hash value on the site before download)
Auditing
hacktivism
U P F
hash
8. The act of dialing all numbers within an organization to discover open modems.
Mantrap
-PT
War Dialing
public key infrastructure (PKI)
9. Two or more LANs connected by a high-speed line across a large geographical area.
Warm Site
Vulnerability
Wi-Fi Protected Access (WPA)
Wide Area Network (WAN)
10. A wireless access point that has either been installed on a secure company network without explicit authorization from a local network administrator - or has been created to allow a hacker to conduct a man-in-the-middle attack.
Active Attack
rogue access point
Authentication - Authorization - and Accounting (AAA)
CAM table
11. An unknown deficiency in software or some other product that results in a security vulnerability being identified.
security defect
SAM
Lightweight Directory Access Protocol (LDAP)
Electronic serial number
12. A text file stored within a browser by a web server that maintains information about the connection. Cookies are used to store information to maintain a unique but consistent surfing experience - but can also contain authentication parameters. Cookie
Cookie
Exploit
Ciphertext
segment
13. A network administration command-line tool available for many operating systems for querying the Domain Name System (DNS) to obtain domain name or IP address mappings or any other specific DNS record.
nslookup
Traceroute
Tunneling
Temporal Key Integrity Protocol (TKIP)
14. A method of defining what rights and permissions an entity has to a given resource. In networking - Access Control Lists are commonly associated with firewall and router traffic filtering rules.
Auditing
Last In First Out (LIFO)
Access Control List (ACL)
Service Set Identifier (SSID)
15. A means of restricting access to system resources based on the sensitivity (as represented by a label) of the information contained in the system resource and the formal authorization (that is - clearance) of users to access information of such sensi
Mandatory access control (MAC)
Contingency Plan
key exchange protocol
Confidentiality
16. A security objective that ensures a resource can be accessed only by authorized users. This is also the property that sensitive information is not disclosed to unauthorized individuals - entities - or processes.
Information Technology (IT) asset criticality
A procedure for identifying active hosts on a network.
session hijacking
Confidentiality
17. An enumeration technique used to provide information about a computer system; generally used for operating system identification (also known as fingerprinting).
Banner Grabbing
queue
Master boot record infector
Pretty Good Privacy (PGP)
18. A self-replicating - self-propagating - self-contained program that uses networking mechanisms to spread itself.
-sO
Zenmap
Worm
serial scan & 300 sec wait
19. A computer file system architecture used in Windows - OS/2 - and most memory cards.
Echo Reply
Discretionary Access Control (DAC)
File Allocation Table (FAT)
-sV
20. A remote control program in which the client runs on a local computer and connects to a remote server on a network. Commands entered locally are executed on the remote system.
Local Administrator
Telnet
separation of duties
Covert Channel
21. ICMP Type/Code 0-0
Echo Reply
remote access
Finding a directory listing and gaining access to a parent or root file for access to other files
Kerberos
22. A computer system that performs tasks dictated by an attacker from a remote location. Zombies may be active or idle - and owners of the systems generally do not know their systems are compromised.
Zombie
-sS
Challenge Handshake Authentication Protocol (CHAP)
Warm Site
23. Provides router-to-router or host-to-network connections over asynchronous and synchronous circuits.
Interior Gateway Protocol (IGP)
Point-to-Point Protocol (PPP)
Point-to-Point Tunneling Protocol (PPTP)
local area network (LAN)
24. Port 22
SSH
File Transfer Protocol (FTP)
sheepdip
A
25. A backup facility with the electrical and physical components of a computer facility - but with no computer equipment in place. The site is ready to receive the necessary replacement computer equipment in the event the user has to move from his main
Telnet
Copyright
-p <port ranges>
Cold Site
26. A technology where you advertise one IP address externally and data packets are rerouted to the appropriate IP address inside your network by a device providing translation services. In this way - IP addresses of machines on your internal network are
Cookie
-PM
Finding a directory listing and gaining access to a parent or root file for access to other files
Network Address Translation (NAT)
27. Any network incident that prompts some kind of log entry or other notification.
S
Event
Open System Interconnection (OSI) Reference Model
port knocking
28. Attacks that take advantage of the built-in code and scripts most off-the-shelf applications come with.
Electronic serial number
Tunnel
shrink-wrap code attacks
pattern matching
29. A standard for encrypting and authenticating MIME data; used primarily for Internet e-mail.
A R
Secure Multipurpose Mail Extension (S/MIME)
Crossover Error Rate (CER)
Certificate Authority (CA)
30. An information assurance strategy in which multiple layers of defense are placed throughout an Information Technology system.
Defense in Depth
Due Care
-sO
Zero Subnet
31. A string used for authentication in SNMP. The public community string is used for read-only searches - whereas the private community string is used for read/write. Community strings are transmitted in clear text in SNMPv1. SNMPv3 provides encryption
Media Access Control (MAC)
Daemon
Community String
Baseline
32. A method in cryptography by which cryptographic keys are exchanged between users - allowing use of a cryptographic algorithm (for example - the Diffie-Hellman key exchange).
Archive
key exchange protocol
Challenge Handshake Authentication Protocol (CHAP)
SYN flood attack
33. Controlling access to a network by analyzing the headers of incoming and outgoing packets - and letting them pass or discarding them based on rule sets created by a network administrator. A packet filter allows or denies packets based on destination
packet filtering
Uniform Resource Locator (URL)
Availability
Asymmetric
34. A number assigned during TCP startup sessions that tracks how much information has been moved. This number is used by hackers when hijacking sessions.
initial sequence number (ISN)
-sP
Self Replicating
Rijndael
35. Whether purposeful or the result of malware or other attack - a backdoor is a hidden capability in a system or program for bypassing normal computer authentication systems.
Backdoor
Written Authorization
EDGAR database
Level III assessment
36. A unit of information formatted according to specific protocols that allows precise transmittal of data from one network node to another. Also called a datagram or data packet - a packet contains a header (container) and a payload (contents). Any IP
Wired Equivalent Privacy (WEP)
risk assessment
Serial Line Internet Protocol (SLIP)
packet
37. A denial-of-service technique that uses numerous hosts to perform the attack.
Secure Sockets Layer (SSL)
Detective Controls
Distributed DoS (DDoS)
Simple Object Access Protocol (SOAP)
38. An approach to restricting system access to authorized users in which roles are created for various job functions. The permissions to perform certain operations are assigned to specific roles. Members of staff (or other system users) are assigned par
role-based access control
Buffer Overflow
Hypertext Transfer Protocol Secure (HTTPS)
stream cipher
39. The process of pinging each address within a subnet to map potential targets. Ping sweeps are unreliable and easily detectable - but very fast.
ping sweep
Droppers
--randomize_hosts -O OS fingerprinting
Telnet
40. A security protocol for wireless local area networks defined in the 802.11b standard; intended to provide the same level of security as a wired LAN. WEP is not considered strong security - although it does authenticate clients to access points - encr
gray hat
Wired Equivalent Privacy (WEP)
Address Resolution Protocol (ARP)
HIDS
41. Activities to determine the extent to which a security control is implemented correctly - operating as intended - and producing the desired outcome with respect to meeting the security requirements for the system.
Assessment
MD5
infrastructure mode
Kerberos
42. The rate at which a biometric system will incorrectly identify an unauthorized individual and allow them access (see false negative).
Auditing
overt channel
False Acceptance Rate (FAR)
quantitative risk assessment
43. The art and science of creating a covert message or image within another message - image - audio - or video file.
steganography
Digital Signature
Multipurpose Internet Mail Extensions (MIME)
Packet Internet Groper (ping)
44. A penetration test in which the ethical hacker has limited knowledge of the intended target(s). Designed to simulate an internal - but non-systemadministrator-level attack.
Annualized Loss Expectancy (ALE)
gray box testing
Back orifice
audit
45. Directing a protocol from one port to another.
role-based access control
-PP
-sO
port redirection
46. A computer network confined to a relatively small area - such as a single building or campus.
User Datagram Protocol (UDP)
HTTP tunneling
self encrypting
local area network (LAN)
47. Also known as a digital certificate - this is an electronic file used to verify a user's identity - providing non-repudiation throughout the system It is also a set of data that uniquely identifies an entity. Certificates contain the entity's public
A
Malware
Certificate
Collision Domain
48. A simple PPP authentication mechanism in which the user name and password are transmitted in clear text to prove identity. PAP compares the user name and password to a table listing authorized users.
Man-in-the-middle attack
initial sequence number (ISN)
Password Authentication Protocol (PAP)
-sT
49. An attack technique that tricks your DNS server into believing it has received authentic information when - in reality - it has been provided fraudulent data. DNS cache poisoning affects user traffic by sending it to erroneous or malicious end points
impersonation
serial scan & 300 sec wait
flood
Domain Name System (DNS) cache poisoning
50. An electronic version of junk mail. Unsolicited commercial e-mail sent to numerous recipients.
protocol
spam
Telnet
penetration testing