SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The act of dialing all numbers within an organization to discover open modems.
War Dialing
--randomize_hosts -O OS fingerprinting
Finding a directory listing and gaining access to a parent or root file for access to other files
A procedure for identifying active hosts on a network.
2. Another term for firewalking
Information Technology (IT) asset criticality
Authentication - Authorization - and Accounting (AAA)
port knocking
Methodology
3. An agreement between the penetration tester and the client detailing the activities the tester is permitted to perform.
Written Authorization
CIA triangle
-oX
A series of messages sent by someone attempting to break into a computer to learn about the computer's network services.
4. A type 0 ICMP message used to reply to ECHO requests. Used with ping to verify network layer connectivity between hosts.
Local Administrator
ECHO reply
smart card
pattern matching
5. An early network application that provides information on users currently logged on to a machine.
Finger
Active Attack
enumeration
Secure Sockets Layer (SSL)
6. A document describing information security guidelines - policies - procedures - and standards.
Authorization
Fraud and related activity in connection with computers
Acceptable Use Policy (AUP)
Information Technology (IT) security architecture and framework
7. A simple PPP authentication mechanism in which the user name and password are transmitted in clear text to prove identity. PAP compares the user name and password to a table listing authorized users.
Information Technology (IT) asset criticality
Password Authentication Protocol (PAP)
Asset
security controls
8. An information assurance strategy in which multiple layers of defense are placed throughout an Information Technology system.
parallel scan & 75 sec timeout & 0.3 sec/probe
-sU
International Organization for Standardization (ISO)
Defense in Depth
9. Idlescan
Community String
-sI
honeynet
spam
10. A nonnumerical - subjective risk evaluation. Used with qualitative assessment (an evaluation of risk that results in ratings of none - low - medium - and high for the probability.)
qualitative analysis
Black Box Testing
site survey
private network address
11. A number assigned during TCP startup sessions that tracks how much information has been moved. This number is used by hackers when hijacking sessions.
initial sequence number (ISN)
DNS
Post Office Protocol 3 (POP3)
Community String
12. ICMP Type/Code 3-13
reverse social engineering
CIA triangle
Audit Trail
Administratively Prohibited
13. The organization that governs the Internet's top-level domains - IP address allocation - and port number assignments.
Internet Assigned Number Authority (IANA)
Possession of access devices
port redirection
spyware
14. A communications protocol used for browsing the Internet.
open source
hacktivism
Interior Gateway Protocol (IGP)
Hypertext Transfer Protocol (HTTP)
15. A storage buffer that transparently stores data so future requests for the same data can be served faster.
symmetric algorithm
Rijndael
Asymmetric
Cache
16. A person or entity indirectly involved in a relationship between two principles.
Third Party
HIDS
shoulder surfing
reverse social engineering
17. The lack of clocking (imposed time ordering) on a bit stream.
Droppers
Asynchronous
Destination Unreachable
segment
18. The security property that data is not modified in an unauthorized and undetected manner. Also - the principle and measures taken to ensure that data received is in the exact same condition and state as when it was originally transmitted.
OpenBSD
security defect
integrity
Telnet
19. Controls to detect anomalies or undesirable events occurring on a system.
Detective Controls
Redundant Array of Independent Disks (RAID)
Buffer Overflow
Internet Protocol (IP)
20. A step-by-step method of solving a problem. In computing security - an algorithm is a set of mathematical rules (logic) for the process of encryption and decryption
Bluetooth
Trapdoor Function
Algorithm
Tunnel
21. The process of pinging each address within a subnet to map potential targets. Ping sweeps are unreliable and easily detectable - but very fast.
ping sweep
Echo request
forwarding
packet filtering
22. Hex 12
A S
War Dialing
keylogger
Information Technology (IT) asset criticality
23. The art and science of creating a covert message or image within another message - image - audio - or video file.
rule-based access control
-sV
steganography
Temporal Key Integrity Protocol (TKIP)
24. An outdated symmetric cipher encryption algorithm - previously U.S. government-approved and used by business and civilian government agencies. DES is no longer considered secure due to the ease with which the entire keyspace can be attempted using mo
Data Encryption Standard (DES)
Domain Name System (DNS) lookup
audit
rule-based access control
25. Conversion of plaintext to ciphertext through the use of a cryptographic algorithm.
Countermeasures
encryption
-sP
serial scan & 300 sec wait
26. FIN Scan
identity theft
Wrapper
Internet Control Message Protocol (ICMP)
-sF
27. 1. The path a packet travels to reach the intended destination. Each individual device along the path traveled is called a hop. 2. Information contained on a device containing instructions for reaching other nodes on the network. This information can
port scanning
Availability
Secure Multipurpose Mail Extension (S/MIME)
route
28. An international encoding standard - working within multiple languages and scripts - that represents each letter - digit - or symbol with a unique numeric value that applies across different platforms.
Virtual Local Area Network (VLAN)
INFOSEC Assessment Methodology (IAM)
Trapdoor Function
Unicode
29. The last portion of the SID that identifies the user to the system in Windows. A RID of 500 identifies the administrator account.
RID Resource identifier
-PP
Smurf attack
gap analysis
30. A virus that plants itself in a system's boot sector and infects the master boot record.
Tunnel
Boot Sector Virus
Confidentiality
Asset
31. An approach to restricting system access to authorized users in which roles are created for various job functions. The permissions to perform certain operations are assigned to specific roles. Members of staff (or other system users) are assigned par
local area network (LAN)
payload
role-based access control
Cryptography
32. Network Scanning
A procedure for identifying active hosts on a network.
Domain Name System (DNS) lookup
Secure Multipurpose Mail Extension (S/MIME)
firewall
33. The process of transforming ciphertext into plaintext through the use of a cryptographic algorithm.
-sR
Decryption
Cache
Bug
34. An environmentally conditioned workspace partially equipped with IT and telecommunications equipment to support relocated IT operations in the event of a significant disruption.
Warm Site
Corrective Controls
Sign in Seal
shoulder surfing
35. The combination of all IT assets - resources - components - and systems.
Information Technology (IT) infrastructure
intranet
quality of service (QoS)
sniffer
36. A collection of historical records or the place where they are kept. In computing - an archive generally refers to backup copies of logs and/or data.
fully qualified domain name (FQDN)
Threat
Archive
Trojan Horse
37. A utility that sends an ICMP Echo message to determine if a specific IP address is accessible; if the message receives a reply - the address is reachable.
Packet Internet Groper (ping)
Virtual Local Area Network (VLAN)
halo effect
Tunneling Virus
38. An attack that exploits the common mistake many people make when installing operating systems
rule-based access control
Bastion host
Network Address Translation (NAT)
operating system attack
39. A section or subset of the network. Often a router or other routing device provides the end point of the segment.
Bluesnarfing
reconnaissance
segment
Brute-Force Password Attack
40. 18 U.S.C. 1030
intrusion detection system (IDS)
Digital Watermarking
non-repudiation
Fraud and related activity in connection with computers
41. A device on a network.
Certificate Authority (CA)
Data Encryption Standard (DES)
Domain Name System (DNS)
node
42. LAN standard - defined by ANSI X3T9.5 - specifying a 100Mbps token-passing network using fiber-optic cable and a dualring architecture for redundancy - with transmission distances of up to two kilometers.
Secure Multipurpose Mail Extension (S/MIME)
Fiber Distributed Data Interface (FDDI)
node
Digital Watermarking
43. A method of falsely identifying the source of data packets; often used by hackers to make it difficult to trace where an attack originated.
spoofing
halo effect
Fraud and related activity in connection with computers
route
44. Port 135
Confidentiality
serial scan & 300 sec wait
identity theft
RPC-DCOM
45. A wireless networking mode where all clients connect to the wireless network through a central access point.
parallel scan & 75 sec timeout & 0.3 sec/probe
Address Resolution Protocol (ARP) table
infrastructure mode
protocol stack
46. A method in cryptography by which cryptographic keys are exchanged between users - allowing use of a cryptographic algorithm (for example - the Diffie-Hellman key exchange).
Methodology
Service Set Identifier (SSID)
key exchange protocol
Multipurpose Internet Mail Extensions (MIME)
47. A computer network confined to a relatively small area - such as a single building or campus - in which devices connect through high-frequency radio waves using IEEE standard 802.11.
hashing algorithm
-sP
Wireless Local Area Network (WLAN)
Competitive Intelligence
48. Hex 10
rule-based access control
A
Tiger Team
Availability
49. ICMP Type/Code 3
Fiber Distributed Data Interface (FDDI)
rootkit
S
Destination Unreachable
50. A means of restricting access to system resources based on the sensitivity (as represented by a label) of the information contained in the system resource and the formal authorization (that is - clearance) of users to access information of such sensi
fully qualified domain name (FQDN)
Mandatory access control (MAC)
HTTP
NOP