SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A technology that establishes a tunnel to create a private - dedicated - leased-line network over the Internet. The data is encrypted so it's readable only by the sender and receiver. Companies commonly use VPNs to allow employees to connect securely
Virtual Private Network (VPN)
Confidentiality
logic bomb
Pretty Good Privacy (PGP)
2. A limit on the amount of time or number of iterations or transmissions in computer and network technology a packet can experience before it will be discarded.
Time To Live (TTL)
Trojan Horse
security by obscurity
hashing algorithm
3. A sublayer of layer 2 of the OSI model - the Data Link layer. It provides addressing and channel access control mechanisms that enable several terminals or network nodes to communicate within a multipoint network.
Media Access Control (MAC)
Self Replicating
Hypertext Transfer Protocol Secure (HTTPS)
Defense in Depth
4. A TCP flag notifying an originating station that the preceding packet (or packets) has been received.
-sR
Crossover Error Rate (CER)
social engineering
Acknowledgment (ACK)
5. ICMP Timestamp
Decryption
-oN
public key
-PP
6. A group of experts that handles computer security incidents.
Unicode
iris scanner
security incident response team (SIRT)
Banner Grabbing
7. A social-engineering attack using computer resources - such as e-mail or IRC.
Computer-Based Attack
Virus
SAM
Black Box Testing
8. An Application layer protocol used primarily by Microsoft Windows to provide shared access to printers - files - and serial ports. It also provides an authenticated interprocess communication mechanism.
serial scan & 300 sec wait
Data Link layer
-sX
Common Internet File System/Server Message Block
9. Looking over an authorized user's shoulder in order to steal information (such as authentication information).
network access server
DNS
flood
shoulder surfing
10. The process of using easily accessible DNS records to map a target network's internal hosts.
Data Link layer
Due Care
DNS enumeration
-sI
11. An e-mail message warning users of a nonexistent virus and encouraging them to pass on the message to other users.
Smurf attack
Virus Hoax
-PT
National Security Agency
12. A physical security attack where the attacker sifts through garbage and recycle bins for information that may be useful on current and future attacks
Daisy Chaining
gray box testing
Dumpster Diving
FreeBSD
13. Activities to determine the extent to which a security control is implemented correctly - operating as intended - and producing the desired outcome with respect to meeting the security requirements for the system.
stateful packet filtering
Banner Grabbing
risk
Assessment
14. A form of fraud in which someone pretends to be someone else by assuming that person's identity - typically in order to access resources or obtain credit and other benefits in that person's name.
reverse lookup; reverse DNS lookup
Crossover Error Rate (CER)
identity theft
gray box testing
15. A connection-oriented - layer 4 protocol for transporting data over network segments. TCP is considered reliable because it guarantees delivery and the proper reordering of transmitted packets. This protocol is used for most long-haul traffic on the
Transmission Control Protocol (TCP)
hot site
security incident response team (SIRT)
quality of service (QoS)
16. A type of DNS transfer - where all records from an SOA are transmitted to the requestor. Zone transfers have two options: full (opcode AXFR) and incremental (IXFR).
404EE
overt channel
Level III assessment
Zone transfer
17. Manipulating a search string with additional specific operators to search for vulnerabilities or very specific information.
Institute of Electrical and Electronics Engineers (IEEE)
smart card
Google hacking
Zenmap
18. A denial-of-service attack where the attacker sends a ping to the network's broadcast address from the spoofed IP address of the target. All systems in the subnet then respond to the spoofed address - eventually flooding the device.
Ethernet
separation of duties
Smurf attack
ring topology
19. A communications protocol used for browsing the Internet.
Hypertext Transfer Protocol (HTTP)
Media Access Control (MAC)
Written Authorization
Cache
20. The organization that governs the Internet's top-level domains - IP address allocation - and port number assignments.
Internet Assigned Number Authority (IANA)
Digital Signature
service level agreements (SLAs)
Malicious code
21. An Application layer protocol for managing devices on an IP network.
polymorphic virus
integrity
Simple Network Management Protocol (SNMP)
spoofing
22. An organization's threshold for the seven areas of information security responsibility. This level is established based on the objectives for maintaining confidentiality - integrity - and availability of the organization's IT assets and infrastructur
remote procedure call (RPC)
Minimum acceptable level of risk
node
Due Care
23. A biometric device that uses pattern-recognition techniques based on images of the irises of an individual's eyes.
Tini
iris scanner
Bluesnarfing
Active Directory (AD)
24. The contents of a packet. A system attack requires the attacker to deliver a malicious payload that is acted upon and executed by the system.
Password Authentication Protocol (PAP)
Zero Subnet
Active Directory (AD)
payload
25. A hardware device used to log keystrokes covertly. Hardware keystroke loggers are very dangerous due to the fact that they cannot be detected through regular software/anti-malware scanning.
protocol
hardware keystroke logger
rootkit
Written Authorization
26. A standard that provides best-practice recommendations on information security management for use by those responsible for initiating - implementing - or maintaining Information Security Management Systems (ISMS). Information security is defined with
Active Fingerprinting
Level III assessment
HTTP
ISO 17799
27. Port 135
RPC-DCOM
Certificate Authority (CA)
Adware
Password Authentication Protocol (PAP)
28. Devices - connected to one or more switches - grouped logically into a single broadcast domain. VLANs enable administrators to divide the devices connected to the switches into multiple VLANs without requiring separate physical switches.
Wi-Fi
LDAP
iris scanner
Virtual Local Area Network (VLAN)
29. A computer security expert who performs security audits and penetration tests against systems or network segments - with the owner's full knowledge and permission - in an effort to increase security.
Ethical Hacker
SOA record
-sR
Post Office Protocol 3 (POP3)
30. All measures and techniques taken to gather information about an intended target. Footprinting can be passive or active.
Countermeasures
User Datagram Protocol (UDP)
footprinting
Accountability
31. FTP Bounce Attack
Information Technology Security Evaluation Criteria (ITSEC)
-b
Wi-Fi
MD5
32. Start of Authority record. This record identifies the primary name server for the zone. The SOA record contains the host name of the server responsible for all DNS records within the namespace - as well as the basic properties of the domain.
network access server
SNMP
SOA record
polymorphic virus
33. A class of algorithms for cryptography that use the same cryptographic key for both decryption and encryption.
private key
symmetric algorithm
Decryption
A
34. The cyclical practice of identifying - classifying - remediating - and mitigating vulnerabilities.
security by obscurity
Vulnerability Management
LDAP
Virus Hoax
35. A software program for remotely controlling a Microsoft Windows computer system over a network. Generally considered malware.
Reconnaissance - Scanning - Gaining Access - Maintaining Access - Covering Tracks
Digital Watermarking
Distributed DoS (DDoS)
NetBus
36. A standard developed to enable routers to exchange messages containing information about routes to reach subnets in the network.
Vulnerability Scanning
Authentication
HIDS
Routing Protocol
37. A wireless LAN device that acts as a central point for all wireless traffic. The AP is connected to both the wireless LAN and the wired LAN - providing wireless clients access to network resources.
quantitative risk assessment
Internet Control Message Protocol (ICMP)
Access Point (AP)
Multipurpose Internet Mail Extensions (MIME)
38. A protocol that uses a private key to encrypt data before transmitting confidential documents over the Internet; widely used on e-commerce - banking - and other sites requiring privacy.
route
Electronic serial number
Secure Sockets Layer (SSL)
Hacks with permission
39. A trusted entity that issues and revokes public key certificates. In a network - a CA is a trusted entity that issues - manages - and revokes security credentials and public keys for message encryption and/or authentication. Within a public key infra
International Organization for Standardization (ISO)
LDAP
Certificate Authority (CA)
MD5
40. Injecting traffic into the network to identify the operating system of a device.
Secure Sockets Layer (SSL)
Timestamping
Active Fingerprinting
network operations center (NOC)
41. A point of reference used to mark an initial state in order to manage change.
Password Authentication Protocol (PAP)
Cryptographic Key
Worm
Baseline
42. A routing protocol developed to be used within a single organization.
Overwhelm CAM table to convert switch to hub mode
Event
-P0
Interior Gateway Protocol (IGP)
43. A device or service designed to obfuscate traffic between a client and the Internet. Generally used to make activity on the Internet as untraceable as possible.
Internet Protocol Security (IPSec) architecture
Anonymizer
--randomize_hosts -O OS fingerprinting
LDAP
44. A brand name of analog scrambling and de-scrambling equipment for cable and satellite television - invented primarily to keep consumer Television receive-only (TVRO) satellite equipment from receiving TV programming except on a subscription basis.
Cookie
Demilitarized Zone (DMZ)
Traceroute
Videocipher II Satellite Encryption System
45. Software code - a portion of data - or sequence of commands intended to take advantage of a bug or vulnerability in order to cause unintended or unanticipated behavior to occur on computer software or hardware.
Droppers
John the Ripper - LOphtcrack - Ophtcrack - Cain and Abel
Exploit
Temporal Key Integrity Protocol (TKIP)
46. An attacker who breaks into computer systems with malicious intent - without the owner's knowledge or permission.
SID
-sX
Black Hat
Active Attack
47. Process of breaking a packet into smaller units when it is being transmitted over a network medium that's unable to support a transmission unit the original size of the packet.
personal identification number (PIN)
open source
fragmentation
Buffer
48. CAN-SPAM
OpenBSD
spoofing
port scanning
Defines legal email marketing
49. The change or growth of a project's scope
Methodology
Presentation layer
scope creep
infrastructure mode
50. The secret portion of an asymmetric key pair typically used to decrypt or digitally sign data. The private key is never shared and is always used for decryption - with one notable exception: The private key is used to encrypt the digital signature.
private key
session hijacking
R
Simple Mail Transfer Protocol (SMTP)