SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A security protocol for wireless local area networks defined in the 802.11b standard; intended to provide the same level of security as a wired LAN. WEP is not considered strong security - although it does authenticate clients to access points - encr
Transmission Control Protocol (TCP)
Wired Equivalent Privacy (WEP)
Mandatory access control (MAC)
Syslog
2. The change or growth of a project's scope
War Chalking
scope creep
stream cipher
Tunneling
3. Looking over an authorized user's shoulder in order to steal information (such as authentication information).
NetBus
Cloning
shoulder surfing
SNMP
4. The exploitation of a security vulnerability
security breach or security incident
parameter tampering
SSH
FreeBSD
5. The act of secretly listening to the private conversations of others without their consent. This can also be done over telephone lines (wiretapping) - e-mail - instant messaging - and other methods of communication considered private
Application-Level Attacks
false rejection rate (FRR)
Eavesdropping
RPC-DCOM
6. A system used by the Securities and Exchange Commission (SEC) for companies and businesses to transmit required filings and information. The EDGAR database performs automated collection - validation - indexing - acceptance - and forwarding of submiss
EDGAR database
Hierarchical File System (HFS)
Bastion host
Self Replicating
7. The public portion of an asymmetric key pair typically used to encrypt data or verify signatures. Public keys are shared and are used to encrypt messages.
spoofing
Asymmetric Algorithm
public key
scope creep
8. A Canonical Name record within DNS - used to provide an alias for a domain name.
FreeBSD
CNAME record
Back orifice
Tiger Team
9. In computer security - this is an algorithm that uses separate keys for encryption and decryption.
risk
Due Diligence
encapsulation
Asymmetric Algorithm
10. A hacking method for stealing the cookies used during a session build and replaying them for unauthorized connection purposes.
Blowfish
Replacing numbers in a url to access other files
sidejacking
404EE
11. In regard to hash algorithms - this occurs when two or more distinct inputs produce the same output.
parallel scan
Collision
gray hat
Videocipher II Satellite Encryption System
12. TCP SYN Scan
packet
-sS
SNMP
key exchange protocol
13. An extensible mechanism for e-mail. A variety of MIME types exist for sending content such as audio - binary - or video using the Simple Mail Transfer Protocol (SMTP).
-oN
Finger
POST
Multipurpose Internet Mail Extensions (MIME)
14. A set of related communications protocols operating together as a group to address communication at some or all of the seven layers of the OSI reference model.
Competitive Intelligence
War Chalking
protocol stack
Boot Sector Virus
15. An authentication method on point-to-point links - using a three-way handshake and a mutually agreed-upon key.
Challenge Handshake Authentication Protocol (CHAP)
Backdoor
Internet Assigned Number Authority (IANA)
Institute of Electrical and Electronics Engineers (IEEE)
16. A denial-of-service technique that uses numerous hosts to perform the attack.
Vulnerability Management
Address Resolution Protocol (ARP)
Written Authorization
Distributed DoS (DDoS)
17. A simple PPP authentication mechanism in which the user name and password are transmitted in clear text to prove identity. PAP compares the user name and password to a table listing authorized users.
Countermeasures
Digital Watermarking
Eavesdropping
Password Authentication Protocol (PAP)
18. Also known as the dot-dot-slash attack. Using directory traversal - the attacker attempts to access restricted directories and execute commands outside intended web server directories by using the URL to redirect to an unintended folder location.
flood
encapsulation
Tiger Team
Directory Traversal
19. Wrapper or Binder
Corrective Controls
local area network (LAN)
Real application encompassing Trojan
POP 3
20. A device that provides access between two or more networks. Gateways are typically used to connect dissimilar networks.
Vulnerability Scanning
Availability
gateway
Cloning
21. A limit on the amount of time or number of iterations or transmissions in computer and network technology a packet can experience before it will be discarded.
Hypertext Transfer Protocol Secure (HTTPS)
Hacks with permission
Anonymizer
Time To Live (TTL)
22. An agreement between the penetration tester and the client detailing the activities the tester is permitted to perform.
Application-Level Attacks
Password Authentication Protocol (PAP)
Written Authorization
replay attack
23. The secret portion of an asymmetric key pair typically used to decrypt or digitally sign data. The private key is never shared and is always used for decryption - with one notable exception: The private key is used to encrypt the digital signature.
Secure Multipurpose Mail Extension (S/MIME)
Information Technology (IT) security architecture and framework
Tunneling
private key
24. A string used for authentication in SNMP. The public community string is used for read-only searches - whereas the private community string is used for read/write. Community strings are transmitted in clear text in SNMPv1. SNMPv3 provides encryption
serial scan & 300 sec wait
Community String
-oN
Multipurpose Internet Mail Extensions (MIME)
25. A technology where you advertise one IP address externally and data packets are rerouted to the appropriate IP address inside your network by a device providing translation services. In this way - IP addresses of machines on your internal network are
Bluesnarfing
Network Address Translation (NAT)
Exposure Factor
Lightweight Directory Access Protocol (LDAP)
26. A connection-oriented - layer 4 protocol for transporting data over network segments. TCP is considered reliable because it guarantees delivery and the proper reordering of transmitted packets. This protocol is used for most long-haul traffic on the
port scanning
Due Diligence
Transmission Control Protocol (TCP)
router
27. The rate at which a biometric system will incorrectly identify an unauthorized individual and allow them access (see false negative).
False Acceptance Rate (FAR)
port redirection
Zone transfer
File Transfer Protocol (FTP)
28. 18 U.S.C. 1030
Domain Name System (DNS)
Electronic serial number
Fraud and related activity in connection with computers
RxBoot
29. A principle in security engineering that attempts to use anonymity and secrecy (of design - implementation - and so on) to provide security; the footprint of the organization - entity - network - or system is kept as small as possible to avoid intere
security by obscurity
Telnet
Malware
serialize scans & 0.4 sec wait
30. A derogatory term used to describe an attacker - usually new to the field - who uses simple - easy-to-follow scripts or programs developed by others to attack computer systems and networks and deface websites.
script kiddie
Level II assessment
The automated process of proactively identifying vulnerabilities of computing systems present in a network
Open System Interconnection (OSI) Reference Model
31. A file system used by the Mac OS.
Hierarchical File System (HFS)
Event
physical security
Distributed DoS (DDoS)
32. A set of rules defined by a system administrator that indicates whether access is allowed or denied to resource objects.
rule-based access control
ISO 17799
Secure Multipurpose Mail Extension (S/MIME)
security by obscurity
33. ICMP Type/Code 3-13
Administratively Prohibited
qualitative analysis
penetration testing
Zombie
34. A small space having two sets of interlocking doors; the first set of doors must close before the second set opens. Typically authentication is required for each door - often using different factors. For example - a smart card may open the first door
Packet Internet Groper (ping)
Copyright
Mantrap
security kernel
35. A widely used authentication protocol developed at the MassachusettsInstitute of Technology (MIT). Kerberos authentication uses tickets - Ticket Granting Service - and Key Distribution Center.
Kerberos
Simple Object Access Protocol (SOAP)
War Dialing
audit
36. The act of checking some sequence of tokens for the presence of the constituents of some pattern.
Exposure Factor
GET
Anonymizer
pattern matching
37. Network Scanning
Internet Assigned Number Authority (IANA)
payload
A procedure for identifying active hosts on a network.
Detective Controls
38. A measurable - physical characteristic used to recognize the identity - or verify the claimed identity - of an applicant. Facial images - fingerprints - and handwriting samples are all examples of biometrics.
LDAP
hacktivism
Biometrics
separation of duties
39. Layer 7 of the OSI reference model. The Application layer provides services to applications - which allow them access to the network. Protocols such as FTP and SMTP reside here.
piggybacking
patch
Bluesnarfing
Application Layer
40. A computer security expert who performs security audits and penetration tests against systems or network segments - with the owner's full knowledge and permission - in an effort to increase security.
role-based access control
Ethical Hacker
personal identification number (PIN)
Discretionary Access Control (DAC)
41. Port 53
operating system attack
Transmission Control Protocol (TCP)
Wi-Fi
DNS
42. Conversion of plaintext to ciphertext through the use of a cryptographic algorithm.
encryption
segment
ECHO reply
intrusion detection system (IDS)
43. A device on a network.
node
keylogger
Internet service provider (ISP)
non-repudiation
44. A pen testing method where the attacker knows all information about the internal network. It is designed to simulate an attack by a disgruntled systems administrator - or similar level.
Confidentiality
Address Resolution Protocol (ARP) table
Domain Name System (DNS) cache poisoning
White Box Testing
45. A brand name of analog scrambling and de-scrambling equipment for cable and satellite television - invented primarily to keep consumer Television receive-only (TVRO) satellite equipment from receiving TV programming except on a subscription basis.
fully qualified domain name (FQDN)
gray box testing
HTTP
Videocipher II Satellite Encryption System
46. Hex 12
halo effect
security incident response team (SIRT)
parameter tampering
A S
47. Controls internal to a system designed to resolve vulnerabilities and errors soon after they arise.
Cracker
Corrective Controls
Covert Channel
inference attack
48. A symmetric key cipher where plaintext bits are combined with a pseudo-random cipher bit stream (keystream) - typically by an exclusive-or (XOR) operation. In a stream cipher the plaintext digits are encrypted one at a time - and the transformation o
passive attack
Man-in-the-middle attack
Presentation layer
stream cipher
49. A suite of protocols used for securing Internet Protocol (IP) communications by authenticating and encrypting each IP packet of a communication session. This suite includes protocols for establishing mutual authentication between agents at the sessio
EDGAR database
Wide Area Network (WAN)
Echo Reply
Internet Protocol Security (IPSec) architecture
50. ICMP Type/Code 8
Covert Channel
HTTP
honeynet
Echo request