SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A limit on the amount of time or number of iterations or transmissions in computer and network technology a packet can experience before it will be discarded.
port knocking
-sA
Time To Live (TTL)
packet
2. Chronological record of system activities to enable the reconstruction and examination of the sequence of events and changes in an event.
Audit Data
Active Fingerprinting
remote procedure call (RPC)
iris scanner
3. Conversion of plaintext to ciphertext through the use of a cryptographic algorithm.
integrity
Active Attack
service level agreements (SLAs)
encryption
4. A sublayer of layer 2 of the OSI model - the Data Link layer. It provides addressing and channel access control mechanisms that enable several terminals or network nodes to communicate within a multipoint network.
Overwhelm CAM table to convert switch to hub mode
Media Access Control (MAC)
Competitive Intelligence
symmetric algorithm
5. A computer virus that infects and spreads in multiple ways.
Multipartite virus
route
Certificate Authority (CA)
Wrapper
6. A biometric device that uses pattern-recognition techniques based on images of the irises of an individual's eyes.
Access Control List (ACL)
Zero Subnet
iris scanner
Competitive Intelligence
7. A text file stored within a browser by a web server that maintains information about the connection. Cookies are used to store information to maintain a unique but consistent surfing experience - but can also contain authentication parameters. Cookie
Acknowledgment (ACK)
National Security Agency
Trusted Computer Base (TCB)
Cookie
8. List Scan
-sL
HIDS
Discretionary Access Control (DAC)
security breach or security incident
9. Wireless LAN standards created by IEEE. 802.11a runs at up to 54Mbps at 5GHz - 802.11b runs at 11Mbps at 2.4GHz - 802.11g runs at 54Mbps at 2.4GHz - and 802.11n can run upwards of 150MBps.
Simple Mail Transfer Protocol (SMTP)
Asymmetric
802.11
-PT
10. Polite scan timing
serialize scans & 0.4 sec wait
Echo request
piggybacking
Asymmetric
11. TCP SYN Scan
ECHO reply
CAM table
-sI
-sS
12. An attack technique that tricks your DNS server into believing it has received authentic information when - in reality - it has been provided fraudulent data. DNS cache poisoning affects user traffic by sending it to erroneous or malicious end points
Master boot record infector
RID Resource identifier
Domain Name System (DNS) cache poisoning
Zombie
13. A utility that traces a packet from your computer to an Internet host - showing how many hops the packet takes to reach the host and how long the packet requires to complete the hop.
Mandatory access control (MAC)
logic bomb
Traceroute
Fast Ethernet
14. Xmas Tree scan
operating system attack
social engineering
-sX
Packet Internet Groper (ping)
15. A unique numerical string - created by a hashing algorithm on a given piece of data - used to verify data integrity. Generally hashes are used to verify the integrity of files after download (comparison to the hash value on the site before download)
hash
Confidentiality
Serial Line Internet Protocol (SLIP)
scope creep
16. nmap
smart card
--randomize_hosts -O OS fingerprinting
Denial of Service (DoS)
Authentication - Authorization - and Accounting (AAA)
17. Start of Authority record. This record identifies the primary name server for the zone. The SOA record contains the host name of the server responsible for all DNS records within the namespace - as well as the basic properties of the domain.
SOA record
Written Authorization
Smurf attack
spyware
18. A networking configuration where all nodes are connected in a circle with no terminated ends on the cable.
Certificate
Authentication Header (AH)
symmetric algorithm
ring topology
19. An announcement - typically from a software vendor - of a known security vulnerability in a program; often the bulletin contains instructions for the application of a software patch.
NetBSD
security bulletins
encapsulation
Auditing
20. An international encoding standard - working within multiple languages and scripts - that represents each letter - digit - or symbol with a unique numeric value that applies across different platforms.
queue
Black Box Testing
Unicode
flood
21. An Application layer protocol used by local email clients to retrieve e-mail from a remote server over a TCP/IP connection.
segment
A procedure for identifying active hosts on a network.
stateful packet filtering
Post Office Protocol 3 (POP3)
22. An industry standard protocol used for accessing and managing information within a directory service; an application protocol for querying and modifying data using directory services running over TCP/IP.
Routing Information Protocol (RIP)
audit
Lightweight Directory Access Protocol (LDAP)
POP 3
23. Cracking Tools
risk acceptance
Three-Way (TCP) Handshake
John the Ripper - LOphtcrack - Ophtcrack - Cain and Abel
-PB
24. A free and popular version of the Unix operating system.
Assessment
Malicious code
Three-Way (TCP) Handshake
FreeBSD
25. The combination of all IT assets - resources - components - and systems.
Hacks without permission
File Transfer Protocol (FTP)
FTP
Information Technology (IT) infrastructure
26. A communications path - such as the Internet - authorized for data transmission within a computer system or network.
Internet Protocol (IP)
Unicode
Demilitarized Zone (DMZ)
overt channel
27. Any item of value or worth to an organization - whether physical or virtual.
Bluejacking
Asset
-sP
Boot Sector Virus
28. nmap all output
phishing
-oA
hash
Replacing numbers in a url to access other files
29. Calculations of two components of risk: R - the magnitude of the potential loss (L) - and the probability - p - that the loss will occur.
POP 3
-sX
Virus Hoax
quantitative risk assessment
30. Directing a protocol from one port to another.
private key
Blowfish
source routing
port redirection
31. A group of experts that handles computer security incidents.
stateful packet filtering
Computer-Based Attack
security incident response team (SIRT)
SSH
32. Set of tools (applications or code) that enables administrator-level accessto a computer or computer network and is designed to obscure the fact that the system has been compromised. Rootkits are dangerous malware entities that provide administrator
rootkit
Zone transfer
Domain Name System (DNS)
false rejection rate (FRR)
33. Port 23
Corrective Controls
Bluesnarfing
Telnet
Vulnerability Scanning
34. CAN-SPAM
public key
Reconnaissance - Scanning - Gaining Access - Maintaining Access - Covering Tracks
Wi-Fi Protected Access (WPA)
Defines legal email marketing
35. Actions - devices - procedures - techniques - or other measures intended to reduce the vulnerability of an information system.
Request for Comments (RFC)
Information Technology (IT) asset valuation
Distributed DoS (DDoS)
Countermeasures
36. Created by the U.S. Federal Communications Commission to uniquely identify mobile devices; often represented as an 11-digit decimal number or eight-digit hexadecimal number.
Electronic serial number
Zombie
Digital Signature
Acknowledgment (ACK)
37. ex 02
segment
S
Accountability
suicide hacker
38. A proprietary - open - wireless technology used for transferring data from fixed and mobile devices over short distances.
gateway
Telnet
Bluetooth
queue
39. ICMP Type/Code 11
Cookie
Hacks with permission
Archive
Time exceeded
40. A portion of memory used to temporarily store output or input data.
Countermeasures
Buffer
protocol
Asymmetric Algorithm
41. LM Hash for short passwords (under 7)
Uniform Resource Locator (URL)
Acceptable Use Policy (AUP)
404EE
Extensible Authentication Protocol (EAP)
42. A card with a built-in microprocessor and memory used for identification or financial transactions. The card transfers data to and from a central computer when inserted into a reader.
Acceptable Use Policy (AUP)
smart card
Minimum acceptable level of risk
Third Party
43. A mode of operation in a wireless LAN in which clients send data directly to one another without utilizing a wireless access point (WAP) - much like a point-to-point wired connection.
Hacks with permission
CIA triangle
ad hoc mode
Network Address Translation (NAT)
44. Software or hardware components that restrict access between a protected network and the Internet - or between other sets of networks - to block unwanted use or attacks.
SSH
hardware keystroke logger
firewall
Wireless Local Area Network (WLAN)
45. The process of a system providing a fully qualified domain name (FQDN) to a local name server - for resolution to its corresponding IP address.
Adware
firewalking
Domain Name System (DNS) lookup
-b
46. Recording the time - normally in a log file - when an event happens or when information is created or modified.
Timestamping
role-based access control
sheepdip
gap analysis
47. A software or hardware application or device that captures user keystrokes.
pattern matching
Anonymizer
Transport Layer Security (TLS)
keylogger
48. A security objective that ensures a resource can be accessed only by authorized users. This is also the property that sensitive information is not disclosed to unauthorized individuals - entities - or processes.
Ethical Hacker
Bluetooth
Confidentiality
-PI
49. A configuration of a network card that makes the card pass all traffic it receives to the central processing unit rather than just frames addressed to it
Extensible Authentication Protocol (EAP)
Internet Protocol Security (IPSec) architecture
Hacks without permission
promiscuous mode
50. An attack with the goal of preventing authorized users from accessing services and preventing the normal operation of computers and networks.
Cracker
Denial of Service (DoS)
limitation of liability and remedies
Reconnaissance - Scanning - Gaining Access - Maintaining Access - Covering Tracks