SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. An API that provides services related to the OSI model's Session layer - allowing applications on separate computers to communicate over a LAN.
reverse lookup; reverse DNS lookup
hashing algorithm
Network Basic Input/Output System (NetBIOS)
Hacks with permission
2. A technology where you advertise one IP address externally and data packets are rerouted to the appropriate IP address inside your network by a device providing translation services. In this way - IP addresses of machines on your internal network are
Network Address Translation (NAT)
gap analysis
FTP
-sS
3. A device providing temporary - on-demand - point-to-point network access to users.
-p <port ranges>
network access server
Cryptography
A R
4. Malicious code that uses a polymorphic engine to mutate while keeping the original algorithm intact; the code changes itself each time it runs - but the function of the code will not change.
Echo request
spyware
Zombie
polymorphic virus
5. 18 U.S.C. 1030
ping sweep
Fraud and related activity in connection with computers
Crossover Error Rate (CER)
parallel scan
6. A type 0 ICMP message used to reply to ECHO requests. Used with ping to verify network layer connectivity between hosts.
reverse social engineering
ECHO reply
Wired Equivalent Privacy (WEP)
null session
7. Whether purposeful or the result of malware or other attack - a backdoor is a hidden capability in a system or program for bypassing normal computer authentication systems.
Ciphertext
OpenBSD
Redundant Array of Independent Disks (RAID)
Backdoor
8. A computer file system architecture used in Windows - OS/2 - and most memory cards.
False Acceptance Rate (FAR)
Multipurpose Internet Mail Extensions (MIME)
Last In First Out (LIFO)
File Allocation Table (FAT)
9. Controls to detect anomalies or undesirable events occurring on a system.
Bluejacking
personal identification number (PIN)
Cracker
Detective Controls
10. An attack where the hacker positions himself between the client and the server - to intercept (and sometimes alter) data traveling between the two.
security controls
Man-in-the-middle attack
XOR Operation
Virus Hoax
11. A protocol used to pass control and error messages between nodes on the Internet.
intrusion prevention system (IPS)
hash
Wi-Fi Protected Access (WPA)
Internet Control Message Protocol (ICMP)
12. A protocol used for sending and receiving log information for nodes on a network.
MAC filtering
Syslog
John the Ripper - LOphtcrack - Ophtcrack - Cain and Abel
forwarding
13. An unknown deficiency in software or some other product that results in a security vulnerability being identified.
-sS
security defect
ECHO reply
HTTP tunneling
14. A step-by-step method of solving a problem. In computing security - an algorithm is a set of mathematical rules (logic) for the process of encryption and decryption
spoofing
qualitative analysis
Algorithm
Dumpster Diving
15. An informed decision to accept the potential for damage to or loss of an IT asset.
risk acceptance
quantitative risk assessment
identity theft
sniffer
16. Devices - connected to one or more switches - grouped logically into a single broadcast domain. VLANs enable administrators to divide the devices connected to the switches into multiple VLANs without requiring separate physical switches.
SID
Virtual Local Area Network (VLAN)
Presentation layer
Tiger Team
17. A protocol defining packets that are able to be routed by a router.
routed protocol
Self Replicating
logic bomb
Antivirus (AV) software
18. A fully operational off-site data-processing facility equipped with hardware and system software to be used in the event of a disaster.
risk assessment
hot site
Bit Flipping
packet filtering
19. An attack in which the hacker can derive information from the ciphertext without actually decoding it. Sensitive information can be considered compromised if an adversary can infer its real value with a high level of confidence.
INFOSEC Assessment Methodology (IAM)
War Chalking
Threat
inference attack
20. Access by information systems (or users) communicating from outside the information system security perimeter.
remote access
public key infrastructure (PKI)
Eavesdropping
security breach or security incident
21. An evaluation consisting of a document review - interviews - and demonstrations. No hands-on testing is performed.
Level I assessment
Malware
Trusted Computer Base (TCB)
End User Licensing Agreement (EULA)
22. Security identifier. The method by which Windows identifies user - group - and computer accounts for rights and permissions.
network operations center (NOC)
Wide Area Network (WAN)
Ethernet
SID
23. Controls internal to a system designed to resolve vulnerabilities and errors soon after they arise.
security by obscurity
Malware
FTP
Corrective Controls
24. A security protocol used in IEEE 802.11i to replace WEP without the requirement to replace legacy hardware.
Temporal Key Integrity Protocol (TKIP)
-sL
Google hacking
Wi-Fi Protected Access (WPA)
25. A computer security expert who performs security audits and penetration tests against systems or network segments - with the owner's full knowledge and permission - in an effort to increase security.
802.11
security defect
Ethical Hacker
Syslog
26. A social-engineering attack using computer resources - such as e-mail or IRC.
Presentation layer
Asset
Computer-Based Attack
Serial Line Internet Protocol (SLIP)
27. Network Scanning
POP 3
spoofing
Extensible Authentication Protocol (EAP)
A procedure for identifying active hosts on a network.
28. The central part of a computer or communications system hardware firmware - and software that implements the basic security procedures for controlling access to system resources.
security defect
Tunnel
security kernel
private key
29. An attack where the hacker manipulates parameters within the URL string in hopes of modifying data.
Competitive Intelligence
parameter tampering
U P F
security by obscurity
30. An attacker who breaks into computer systems with malicious intent - without the owner's knowledge or permission.
Black Hat
serialize scans & 0.4 sec wait
Annualized Loss Expectancy (ALE)
Syslog
31. A piece of software - provided by the vendor - intended to update or fix known - discovered problems in a computer program or its supporting data.
Bluesnarfing
footprinting
patch
flood
32. A type of denial-of-service attack where a hacker sends thousands of SYN packets to the target with spoofed IP addresses.
Information Technology (IT) infrastructure
payload
Wireless Local Area Network (WLAN)
SYN attack
33. A computer system that performs tasks dictated by an attacker from a remote location. Zombies may be active or idle - and owners of the systems generally do not know their systems are compromised.
Zombie
SNMP
Database
reverse social engineering
34. A person or entity indirectly involved in a relationship between two principles.
Droppers
Black Hat
Third Party
net use \[target ip]IPC$ '' /user:''
35. An Application layer protocol used by local email clients to retrieve e-mail from a remote server over a TCP/IP connection.
firewall
Post Office Protocol 3 (POP3)
Active Directory (AD)
port redirection
36. A storage buffer that transparently stores data so future requests for the same data can be served faster.
Hierarchical File System (HFS)
Accountability
Cache
Macro virus
37. A structured set of criteria for evaluating computer security within products and systems produced by European countries; it has been largely replaced by the Common Criteria.
risk acceptance
symmetric encryption
Information Technology Security Evaluation Criteria (ITSEC)
Asset
38. A programming principle whereby the last piece of data added to the stack is the first piece of data taken off.
Last In First Out (LIFO)
Secure Sockets Layer (SSL)
LDAP
-PB
39. An inspection of a place where a company or individual proposes to work - to gather the necessary information for a design or risk assessment.
Detective Controls
Application Layer
site survey
security kernel
40. A mode of operation for a block cipher - with the characteristic that each possible block of plaintext has a defined corresponding ciphertext value - and vice versa
Bug
Electronic Code Book (ECB)
GET
SSH
41. UDP Scan
DNS enumeration
-sU
Client
Echo request
42. A host designed to collect data on suspicious activity.
hardware keystroke logger
honeypot
gap analysis
Ethernet
43. Monitoring of telephone or Internet conversations - typically by covert means.
Biometrics
reverse lookup; reverse DNS lookup
Wiretapping
INFOSEC Assessment Methodology (IAM)
44. Polite scan timing
serialize scans & 0.4 sec wait
Trojan Horse
Hypertext Transfer Protocol (HTTP)
LDAP
45. The process of a system providing a fully qualified domain name (FQDN) to a local name server - for resolution to its corresponding IP address.
Audit Data
Multipurpose Internet Mail Extensions (MIME)
Domain Name System (DNS) lookup
Routing Information Protocol (RIP)
46. A communications protocol used for browsing the Internet.
parallel scan & 300 sec timeout & 1.25 sec/probe
Tunnel
Level I assessment
Hypertext Transfer Protocol (HTTP)
47. A proprietary - open - wireless technology used for transferring data from fixed and mobile devices over short distances.
Media Access Control (MAC)
SAM
Domain Name
Bluetooth
48. Computer software or hardware that can intercept and log traffic passing over a digital network.
NOP
Cryptographic Key
sniffer
Multipartite virus
49. A virus designed to infect the master boot record.
Master boot record infector
gap analysis
Daisy Chaining
security incident response team (SIRT)
50. The process of determining if a network entity (user or service) is legitimate
local area network (LAN)
network interface card (NIC)
Trusted Computer System Evaluation Criteria (TCSEC)
Authentication