SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. An Application layer protocol for managing devices on an IP network.
Authorization
Simple Network Management Protocol (SNMP)
-PB
source routing
2. Black box test
single loss expectancy (SLE)
Acceptable Use Policy (AUP)
No previous knowledge of the network
Kerberos
3. A standard developed to enable routers to exchange messages containing information about routes to reach subnets in the network.
Routing Protocol
Videocipher II Satellite Encryption System
packet filtering
Back orifice
4. Aggressive scan timing
flood
network access server
CNAME record
parallel scan & 300 sec timeout & 1.25 sec/probe
5. A piece of software - provided by the vendor - intended to update or fix known - discovered problems in a computer program or its supporting data.
patch
Hypertext Transfer Protocol Secure (HTTPS)
-sP
Vulnerability Management
6. Calculations of two components of risk: R - the magnitude of the potential loss (L) - and the probability - p - that the loss will occur.
-PS
Man-in-the-middle attack
gray hat
quantitative risk assessment
7. A program designed to execute at a specific time to release malicious code onto the computer system or network.
hash
Electronic Code Book (ECB)
Time Bomb
secure channel
8. The art and science of creating a covert message or image within another message - image - audio - or video file.
Network Basic Input/Output System (NetBIOS)
steganography
hash
-sL
9. A network administration command-line tool available for many operating systems for querying the Domain Name System (DNS) to obtain domain name or IP address mappings or any other specific DNS record.
nslookup
802.11
polymorphic virus
Whois
10. A security tool designed to protect a system or network against attacks by comparing traffic patterns against a list of both known attack signatures and general characteristics of how attacks may be carried out. Threats are rated and protective measu
Target Of Engagement (TOE)
intrusion prevention system (IPS)
nslookup
Collision Domain
11. Hashing algorithm that results in a 128-bit output.
MD5
Authorization
Trapdoor Function
Black Box Testing
12. Weakness in an information system - system security procedures - internal controls - or implementation that could be exploited or triggered by a threat source.
Vulnerability
audit
Application Layer
protocol
13. An attack that exploits the common mistake many people make when installing operating systems
Exploit
operating system attack
RID Resource identifier
ECHO reply
14. A cell phone attack in which the serial number from one cell phone is copied to another in an effort to copy the cell phone.
Cloning
Minimum acceptable level of risk
Asset
router
15. Physical socket provided on routers and switches for cable connections between a computer and the router/switch. This connection enables the computer to configure - query - and troubleshoot the router/switch by use of a terminal emulator and a comman
Access Point (AP)
Ciphertext
Console Port
404EE
16. A suite of protocols used for securing Internet Protocol (IP) communications by authenticating and encrypting each IP packet of a communication session. This suite includes protocols for establishing mutual authentication between agents at the sessio
parallel scan
Internet Protocol Security (IPSec) architecture
Banner Grabbing
Wrapper
17. An HTTP command to transmit text to a web server for processing. The opposite of an HTTP GET.
POST
Time To Live (TTL)
Active Directory (AD)
Corrective Controls
18. Port 389
risk avoidance
LDAP
Institute of Electrical and Electronics Engineers (IEEE)
Mandatory access control (MAC)
19. An e-mail protection method using a secret message or image that can be referenced on any official communication with the site; if an e-mail is received without the image or message - the recipient knows it is not legitimate.
Sign in Seal
Bluetooth
Database
Covert Channel
20. Version Detection Scan
Accountability
Authentication
R
-sV
21. Insane scan timing
parallel scan & 75 sec timeout & 0.3 sec/probe
Multipurpose Internet Mail Extensions (MIME)
Bastion host
Bluejacking
22. LM Hash for short passwords (under 7)
404EE
promiscuous mode
Black Hat
FreeBSD
23. PI and PT Ping
-sV
-PB
SYN attack
Pretty Good Privacy (PGP)
24. Ports 20/21
Cloning
FTP
Open System Interconnection (OSI) Reference Model
stateful packet filtering
25. In computer security - this is an algorithm that uses separate keys for encryption and decryption.
Wrapper
remote access
Asymmetric Algorithm
Domain Name
26. Nmap normal output
Certificate Authority (CA)
-sW
War Driving
-oN
27. An industry standard protocol used for accessing and managing information within a directory service; an application protocol for querying and modifying data using directory services running over TCP/IP.
ad hoc mode
Wiretapping
Countermeasures
Lightweight Directory Access Protocol (LDAP)
28. ICMP Type/Code 0-0
POST
Kerberos
Echo Reply
Trusted Computer Base (TCB)
29. The security property that data is not modified in an unauthorized and undetected manner. Also - the principle and measures taken to ensure that data received is in the exact same condition and state as when it was originally transmitted.
integrity
Domain Name System (DNS) lookup
Trusted Computer Base (TCB)
False Acceptance Rate (FAR)
30. A method of evaluating the security of a computer system or network by simulating an attack from a malicious source.
Cracker
Methodology
penetration testing
Exploit
31. Directory Transversal
SYN attack
Finding a directory listing and gaining access to a parent or root file for access to other files
-PI
Assessment
32. Defined in RFC 826 - ARP is a protocol used to map a known IP address to a physical (MAC) address.
-PS
Pretty Good Privacy (PGP)
ad hoc mode
Address Resolution Protocol (ARP)
33. The rate at which a biometric system will incorrectly identify an unauthorized individual and allow them access (see false negative).
False Acceptance Rate (FAR)
Baseline
audit
reverse social engineering
34. A simple PPP authentication mechanism in which the user name and password are transmitted in clear text to prove identity. PAP compares the user name and password to a table listing authorized users.
Password Authentication Protocol (PAP)
route
honeynet
Cracker
35. A term representing the responsibility managers and their organizations have to provide information security to ensure the type of control - the cost of control - and the deployment of control are appropriate for the system being managed.
-sU
Tumbling
-sX
Due Care
36. An attack where the hacker repeats a portion of a cryptographic exchange in hopes of fooling the system into setting up a communications channel.
NOP
-PT
replay attack
Zero Subnet
37. Terminal Access Controller Access-Control System. A remote authentication protocol that is used to communicate with an authentication server commonly used in Unix networks.
TACACS
port knocking
Internet Control Message Protocol (ICMP)
Trojan Horse
38. Another term for firewalking
Tini
Internet Protocol Security (IPSec) architecture
port knocking
Baseline
39. Self-contained network with a limited number of participants who extend limited trust to one another in order to accomplish an agreed-upon goal.
Temporal Key Integrity Protocol (TKIP)
spyware
intranet
Videocipher II Satellite Encryption System
40. White hat
Hacks with permission
-sL
source routing
risk avoidance
41. Port 22
intrusion detection system (IDS)
SSH
Extensible Authentication Protocol (EAP)
Post Office Protocol 3 (POP3)
42. The process of using easily accessible DNS records to map a target network's internal hosts.
suicide hacker
Digital Watermarking
DNS enumeration
parameter tampering
43. A standard for encrypting and authenticating MIME data; used primarily for Internet e-mail.
Secure Multipurpose Mail Extension (S/MIME)
Interior Gateway Protocol (IGP)
Anonymizer
proxy server
44. The central part of a computer or communications system hardware firmware - and software that implements the basic security procedures for controlling access to system resources.
security kernel
parallel scan & 300 sec timeout & 1.25 sec/probe
Application Layer
Information Technology (IT) asset criticality
45. A group of penetration testers that assess the security of an organization - which is often unaware of the existence of the team or the exact assignment.
Collision
Fiber Distributed Data Interface (FDDI)
red team
NetBSD
46. Content Addressable Memory table. Holds all the MAC-address-to-port mappings on a switch.
shoulder surfing
Algorithm
CAM table
Pretty Good Privacy (PGP)
47. A limit on the amount of time or number of iterations or transmissions in computer and network technology a packet can experience before it will be discarded.
node
RxBoot
honeypot
Time To Live (TTL)
48. A computer virus that infects and spreads in multiple ways.
flood
Media Access Control (MAC)
404EE
Multipartite virus
49. A routing protocol developed to be used within a single organization.
Interior Gateway Protocol (IGP)
serialize scans & 15 sec wait
Adware
impersonation
50. Polite scan timing
Wired Equivalent Privacy (WEP)
Database
serialize scans & 0.4 sec wait
Google hacking