SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Attacks that take advantage of the built-in code and scripts most off-the-shelf applications come with.
shrink-wrap code attacks
Anonymizer
Covert Channel
-oX
2. Port 22
social engineering
S
sidejacking
SSH
3. The means by which a recipient of a message can ensure the identity of the sender and that neither party can deny having sent or received the message. The most common method is through digital certificates.
non-repudiation
Sign in Seal
Service Set Identifier (SSID)
ISO 17799
4. A cyber attacker who acts without permission from - and gives prior notice to - the resource owner. Also known as a malicious hacker.
Cracker
parallel scan & 300 sec timeout & 1.25 sec/probe
Auditing
smart card
5. A malicious computer program with self-replication capabilities that attaches to another file and moves with the host from one computer to another.
heuristic scanning
Zombie
Virus
enumeration
6. A fully operational off-site data-processing facility equipped with hardware and system software to be used in the event of a disaster.
Virus
hot site
session hijacking
Biometrics
7. A social-engineering attack that manipulates the victim into calling the attacker for help.
reverse social engineering
heuristic scanning
A
payload
8. A type of attack used to deny service to legitimate users of a network resource by intentionally overloading the network with illegitimate TCP connection requests. SYN packets are sent repeatedly to the target - but the corresponding SYN/ACK response
security incident response team (SIRT)
Threat
Lightweight Directory Access Protocol (LDAP)
SYN flood attack
9. The security property that data is not modified in an unauthorized and undetected manner. Also - the principle and measures taken to ensure that data received is in the exact same condition and state as when it was originally transmitted.
gray box testing
enumeration
integrity
Dumpster Diving
10. A brand name of analog scrambling and de-scrambling equipment for cable and satellite television - invented primarily to keep consumer Television receive-only (TVRO) satellite equipment from receiving TV programming except on a subscription basis.
protocol stack
Man-in-the-middle attack
Videocipher II Satellite Encryption System
gray hat
11. The set of all hardware - firmware - and/or software components critical to IT security. Bugs or vulnerabilities occurring inside the TCB might jeopardize the security properties of the entire system.
hybrid attack
The automated process of proactively identifying vulnerabilities of computing systems present in a network
Trusted Computer Base (TCB)
steganography
12. In a classful IPv4 subnet - this is the network number with all binary 0s in the subnet part of the number. When written in decimal - the zero subnet has the same number as the classful network number.
Zero Subnet
reconnaissance
Acceptable Use Policy (AUP)
Level I assessment
13. A denial-of-service attack where the attacker sends a ping to the network's broadcast address from the spoofed IP address of the target. All systems in the subnet then respond to the spoofed address - eventually flooding the device.
Smurf attack
Defense in Depth
rule-based access control
Cookie
14. Text or data in its encrypted form; the result of plaintext being input into a cryptographic algorithm.
Ciphertext
security incident response team (SIRT)
Tunneling Virus
-PS
15. Formal description and evaluation of the vulnerabilities in an information system
Finding a directory listing and gaining access to a parent or root file for access to other files
Vulnerability Assessment
private network address
human-based social engineering
16. A term trademarked by the Wi-Fi Alliance - used to define a standard for devices to use to connect to a wireless network.
private key
Wi-Fi
quantitative risk assessment
-sF
17. Nmap normal output
SNMP
firewalking
Media Access Control (MAC)
-oN
18. Layer 2 of the OSI reference model. This layer provides reliable transit of data across a physical link. The Data Link layer is concerned with physical addressing - network topology - access to the network medium - error detection - sequential delive
passive attack
Ethical Hacker
Data Link layer
private key
19. A protocol that uses a private key to encrypt data before transmitting confidential documents over the Internet; widely used on e-commerce - banking - and other sites requiring privacy.
Secure Sockets Layer (SSL)
-sL
parameter tampering
risk
20. A device on a network.
-sS
local area network (LAN)
node
separation of duties
21. Created by the U.S. Federal Communications Commission to uniquely identify mobile devices; often represented as an 11-digit decimal number or eight-digit hexadecimal number.
Electronic serial number
Computer-Based Attack
802.11 i
-sL
22. Software or firmware intended to perform an unauthorized process that will have an adverse impact on the confidentiality - integrity - or availability of an information system. A virus - worm - Trojan horse - or other code-based entity that infects a
Malicious code
replay attack
-p <port ranges>
-PT
23. A symmetric key cryptographic algorithm that transforms a block of information at a time using a cryptographic key. For a block cipher algorithm - the length of the input block is the same as the length of the output block.
null session
intrusion detection system (IDS)
serial scan & 300 sec wait
Block Cipher
24. A VPN tunneling protocol with encryption. PPTP connects two nodes in a VPN by using one TCP port for negotiation and authentication and one IP protocol for data transfer.
hardware keystroke logger
Kerberos
Point-to-Point Tunneling Protocol (PPTP)
Port Address Translation (PAT)
25. UDP Scan
-sU
NetBSD
Rijndael
User Datagram Protocol (UDP)
26. Cracking Tools
John the Ripper - LOphtcrack - Ophtcrack - Cain and Abel
hash
Bluesnarfing
protocol
27. An Internet Protocol Security (IPSec) header used to verify that the contents of a packet have not been modified while the packet was in transit.
War Dialing
Due Diligence
Authentication Header (AH)
Challenge Handshake Authentication Protocol (CHAP)
28. A symmetric key cipher where plaintext bits are combined with a pseudo-random cipher bit stream (keystream) - typically by an exclusive-or (XOR) operation. In a stream cipher the plaintext digits are encrypted one at a time - and the transformation o
Black Hat
Time To Live (TTL)
stream cipher
-sV
29. A type of encryption where the same key is used to encrypt and decrypt the message.
Database
symmetric algorithm
Internet service provider (ISP)
symmetric encryption
30. A computer virus that infects and spreads in multiple ways.
false rejection rate (FRR)
Bluejacking
Multipartite virus
Baseline
31. An informed decision to accept the potential for damage to or loss of an IT asset.
serialize scans & 0.4 sec wait
parameter tampering
risk acceptance
ad hoc mode
32. The subjective - potential percentage of loss to a specific asset if a specific threat is realized. The exposure factor (EF) is a subjective value the person assessing risk must define.
Presentation layer
shoulder surfing
Man-in-the-middle attack
Exposure Factor
33. nmap
physical security
reverse social engineering
--randomize_hosts -O OS fingerprinting
Open System Interconnection (OSI) Reference Model
34. A social-engineering attack using computer resources - such as e-mail or IRC.
Exposure Factor
routed protocol
Computer-Based Attack
network access server
35. A series of documents and notes on standards used or proposed for use on the Internet; each is identified by a number.
gray hat
Annualized Loss Expectancy (ALE)
Acceptable Use Policy (AUP)
Request for Comments (RFC)
36. A widely used authentication protocol developed at the MassachusettsInstitute of Technology (MIT). Kerberos authentication uses tickets - Ticket Granting Service - and Key Distribution Center.
risk
NetBus
Kerberos
White Box Testing
37. An information assurance strategy in which multiple layers of defense are placed throughout an Information Technology system.
service level agreements (SLAs)
Defense in Depth
Biometrics
serial scan & 300 sec wait
38. White hat
POP 3
Hacks with permission
POST
human-based social engineering
39. An evaluation consisting of a document review - interviews - and demonstrations - as well as vulnerability scans and hands-on testing.
Buffer Overflow
Level II assessment
Syslog
Denial of Service (DoS)
40. A symmetric - block-cipher data-encryption standard that uses a variablelength key that can range from 32 bits to 448 bits.
CAM table
Blowfish
Eavesdropping
Daemon
41. Unauthorized access to information such as a calendar - contact list - e-mails - and text messages on a wireless device through a Bluetooth connection.
Data Link layer
Syslog
Internet Protocol (IP)
Bluesnarfing
42. Transmitting one protocol encapsulated inside another protocol.
hacktivism
Tunneling
Data Link layer
Internet Assigned Number Authority (IANA)
43. A remote control program in which the client runs on a local computer and connects to a remote server on a network. Commands entered locally are executed on the remote system.
smart card
GET
sheepdip
Telnet
44. A computer network confined to a relatively small area - such as a single building or campus.
intrusion prevention system (IPS)
local area network (LAN)
Decryption
-oA
45. A host designed to collect data on suspicious activity.
honeypot
SSH
security incident response team (SIRT)
LDAP
46. FTP Bounce Attack
-b
key exchange protocol
NetBSD
Telnet
47. A point of reference used to mark an initial state in order to manage change.
Cracker
Baseline
Computer Emergency Response Team (CERT)
Mantrap
48. Used for exchanging structured information - such as XML-based messages - in the implementation of web services
Bug
FreeBSD
Simple Object Access Protocol (SOAP)
symmetric algorithm
49. The process of recording activity on a system for monitoring and later review.
Auditing
Tunneling Virus
script kiddie
patch
50. Shifting responsibility from one party to another
Internet Control Message Protocol (ICMP)
Fraud and related activity in connection with computers
risk transference
-oX