SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A standard for encrypting e-mail - web pages - and other stream-oriented information transmitted over the Internet.
ring topology
session splicing
Transport Layer Security (TLS)
Wireless Local Area Network (WLAN)
2. A business - government agency - or educational institution that provides access to the Internet.
Internet service provider (ISP)
White Box Testing
Man-in-the-middle attack
Wide Area Network (WAN)
3. A Windows-based GUI version of nmap.
Cookie
FTP
Zenmap
Level III assessment
4. The act or actions of a hacker to put forward a cause or a political agenda - to affect some societal change - or to shed light on something he feels to be political injustice. These activities are usually illegal in nature.
Man-in-the-middle attack
LDAP
U P F
hacktivism
5. A set of rules defined to screen network packets based on source address - destination address - or protocol; these rules determine whether the packet will be forwarded or discarded.
network tap
-sR
A S
Filter
6. CAN-SPAM
Defines legal email marketing
Crossover Error Rate (CER)
Electronic serial number
halo effect
7. A fully qualified domain name consists of a host and domain name - including a top-level domain such as .com - .net - .mil - .edu -and so on.
personal identification number (PIN)
fully qualified domain name (FQDN)
Google hacking
Domain Name System (DNS) lookup
8. A small space having two sets of interlocking doors; the first set of doors must close before the second set opens. Typically authentication is required for each door - often using different factors. For example - a smart card may open the first door
port scanning
Mantrap
-sA
OpenBSD
9. List Scan
-sL
S
Cache
Institute of Electrical and Electronics Engineers (IEEE)
10. The act of using numerous electronic serial numbers on a cell phone until a valid number is located.
Tumbling
International Organization for Standardization (ISO)
gray box testing
Zombie
11. A wireless access point that has either been installed on a secure company network without explicit authorization from a local network administrator - or has been created to allow a hacker to conduct a man-in-the-middle attack.
RPC-DCOM
Port Address Translation (PAT)
rogue access point
Malware
12. A document describing information security guidelines - policies - procedures - and standards.
Defines legal email marketing
Information Technology (IT) security architecture and framework
hashing algorithm
Archive
13. Ping Scan
phishing
hardware keystroke logger
R
-sP
14. The central part of a computer or communications system hardware firmware - and software that implements the basic security procedures for controlling access to system resources.
routed protocol
CAM table
Cold Site
security kernel
15. In penetration testing - this is a method of testing the security of a system or subnet without any previous knowledge of the device or network. Designed to simulate an attack by an outside intruder (usually from the Internet).
risk
asynchronous transmission
intranet
Black Box Testing
16. Port 88
Tunnel
Kerberos
Multipartite virus
Tini
17. Microsoft SID 500
File Allocation Table (FAT)
Digital Signature
Local Administrator
POP 3
18. The contents of a packet. A system attack requires the attacker to deliver a malicious payload that is acted upon and executed by the system.
Routing Protocol
payload
Internet Assigned Number Authority (IANA)
-oN
19. Originally an extension of PPP - this is a protocol for authentication used within wireless networks. Works with multiple authentication measures.
out-of-band signaling
Extensible Authentication Protocol (EAP)
Media Access Control (MAC)
network interface card (NIC)
20. The condition of a resource being ready for use and accessible by authorized users.
Point-to-Point Tunneling Protocol (PPTP)
protocol stack
-sR
Availability
21. A command used in HTTP and FTP to retrieve a file from a server.
Unicode
GET
File Allocation Table (FAT)
source routing
22. The monetary loss that can be expected for an asset due to risk over a one-year period. ALE is the product of the annual rate of occurrence (ARO) and the single loss expectancy (SLE). It is mathematically expressed as ALE = ARO
Annualized Loss Expectancy (ALE)
SSH
service level agreements (SLAs)
single loss expectancy (SLE)
23. An information assurance strategy in which multiple layers of defense are placed throughout an Information Technology system.
Defense in Depth
Competitive Intelligence
NetBus
routed protocol
24. An Application layer protocol - using TCP - for transporting files across an Internet connection. FTP transmits in clear text.
Kerberos
steganography
File Transfer Protocol (FTP)
Multipurpose Internet Mail Extensions (MIME)
25. A portion of memory used to temporarily store output or input data.
firewall
serialize scans & 0.4 sec wait
Buffer
network tap
26. A type of attack used to deny service to legitimate users of a network resource by intentionally overloading the network with illegitimate TCP connection requests. SYN packets are sent repeatedly to the target - but the corresponding SYN/ACK response
SYN flood attack
Real application encompassing Trojan
Bluetooth
fully qualified domain name (FQDN)
27. A term trademarked by the Wi-Fi Alliance - used to define a standard for devices to use to connect to a wireless network.
-sS
Computer-Based Attack
Wi-Fi
Methodology
28. An HTTP command to transmit text to a web server for processing. The opposite of an HTTP GET.
risk acceptance
OpenBSD
POST
Web Spider
29. A security protocol used in IEEE 802.11i to replace WEP without the requirement to replace legacy hardware.
U P F
Temporal Key Integrity Protocol (TKIP)
Active Attack
CNAME record
30. A wireless networking mode where all clients connect to the wireless network through a central access point.
Backdoor
infrastructure mode
MD5
service level agreements (SLAs)
31. Computer software or hardware that can intercept and log traffic passing over a digital network.
Authentication - Authorization - and Accounting (AAA)
sniffer
hashing algorithm
Block Cipher
32. A protocol that uses a private key to encrypt data before transmitting confidential documents over the Internet; widely used on e-commerce - banking - and other sites requiring privacy.
-sO
proxy server
Secure Sockets Layer (SSL)
Password Authentication Protocol (PAP)
33. An Internet routing protocol used to exchange routing information within an autonomous system.
Interior Gateway Protocol (IGP)
net use \[target ip]IPC$ '' /user:''
Asynchronous
local area network (LAN)
34. A computer file system architecture used in Windows - OS/2 - and most memory cards.
phishing
Temporal Key Integrity Protocol (TKIP)
File Allocation Table (FAT)
RxBoot
35. A hacking method for stealing the cookies used during a session build and replaying them for unauthorized connection purposes.
Active Fingerprinting
Fast Ethernet
Exploit
sidejacking
36. Wrapper or Binder
Real application encompassing Trojan
session splicing
risk assessment
Virus
37. Port 23
Telnet
Wi-Fi
ISO 17799
Audit Trail
38. A type of denial-of-service attack where a hacker sends thousands of SYN packets to the target with spoofed IP addresses.
Bluesnarfing
SYN attack
security incident response team (SIRT)
secure channel
39. ICMP Ping
Computer Emergency Response Team (CERT)
Defines legal email marketing
Brute-Force Password Attack
-PI
40. Actions - devices - procedures - techniques - or other measures intended to reduce the vulnerability of an information system.
replay attack
hot site
serialize scans & 0.4 sec wait
Countermeasures
41. Used for exchanging structured information - such as XML-based messages - in the implementation of web services
Vulnerability
Simple Object Access Protocol (SOAP)
symmetric algorithm
-sX
42. Safeguards or countermeasures to avoid - counteract - or minimize security risks.
hot site
security controls
Domain Name System (DNS) cache poisoning
Service Set Identifier (SSID)
43. A set of related communications protocols operating together as a group to address communication at some or all of the seven layers of the OSI reference model.
ECHO reply
session hijacking
protocol stack
Smurf attack
44. Looking over an authorized user's shoulder in order to steal information (such as authentication information).
Cryptographic Key
shoulder surfing
Active Fingerprinting
hot site
45. Freely and readily available information on an organization that can be gathered by a business entity about its competitor's customers - products - and marketing - and can be used by an attacker to build useful information for further attacks.
RPC-DCOM
Competitive Intelligence
Contingency Plan
Wi-Fi Protected Access (WPA)
46. Using conversation or some other interaction between people to gather useful information.
-PS
human-based social engineering
Active Directory (AD)
Community String
47. An informed decision to accept the potential for damage to or loss of an IT asset.
-PI
asynchronous transmission
risk acceptance
security incident response team (SIRT)
48. The steps taken to gather evidence and information on the targets you wish to attack.
Vulnerability Management
port redirection
reconnaissance
A S
49. A text file stored within a browser by a web server that maintains information about the connection. Cookies are used to store information to maintain a unique but consistent surfing experience - but can also contain authentication parameters. Cookie
Wrapper
A S
Defines legal email marketing
Cookie
50. ICMP Type/Code 3
private network address
Destination Unreachable
quality of service (QoS)
Countermeasures