SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A device that receives and sends data packets between two or more networks; the packet headers and a forwarding table provide the router with the information necessary for deciding which interface to use to forward packets.
router
Vulnerability Management
Point-to-Point Protocol (PPP)
802.11
2. A type of DNS transfer - where all records from an SOA are transmitted to the requestor. Zone transfers have two options: full (opcode AXFR) and incremental (IXFR).
OpenBSD
fully qualified domain name (FQDN)
Zone transfer
Internet Protocol (IP)
3. A Canonical Name record within DNS - used to provide an alias for a domain name.
self encrypting
CNAME record
Telnet
Dumpster Diving
4. Formerly Redundant Array of Inexpensive Disks; a technology that provides increased storage functions and reliability through redundancy. This is achieved by combining multiple disk drive components into a logical unit - where data is distributed acr
Active Attack
human-based social engineering
Redundant Array of Independent Disks (RAID)
Vulnerability Management
5. A computer system that performs tasks dictated by an attacker from a remote location. Zombies may be active or idle - and owners of the systems generally do not know their systems are compromised.
Zombie
serialize scans & 0.4 sec wait
Bluetooth
source routing
6. A network system of servers that translates numeric Internet Protocol (IP) addresses into human-friendly - hierarchical Internet addresses - and vice versa.
hashing algorithm
Echo Reply
Domain Name System (DNS)
-oA
7. Polymorphic Virus
self encrypting
SYN attack
Local Administrator
Annualized Loss Expectancy (ALE)
8. A file system used by the Mac OS.
Virus Hoax
Network Address Translation (NAT)
false negative
Hierarchical File System (HFS)
9. A device on a network.
security kernel
War Chalking
node
INFOSEC Assessment Methodology (IAM)
10. An authentication method on point-to-point links - using a three-way handshake and a mutually agreed-upon key.
Challenge Handshake Authentication Protocol (CHAP)
No previous knowledge of the network
Secure Sockets Layer (SSL)
service level agreements (SLAs)
11. The process of pinging each address within a subnet to map potential targets. Ping sweeps are unreliable and easily detectable - but very fast.
private network address
Buffer Overflow
ping sweep
Wireless Local Area Network (WLAN)
12. Controls to detect anomalies or undesirable events occurring on a system.
Bug
Detective Controls
network interface card (NIC)
serialize scans & 15 sec wait
13. All measures and techniques taken to gather information about an intended target. Footprinting can be passive or active.
forwarding
Adware
footprinting
NT LAN Manager (NTLM)
14. A computer security expert who performs security audits and penetration tests against systems or network segments - with the owner's full knowledge and permission - in an effort to increase security.
serialize scans & 0.4 sec wait
ring topology
private network address
Ethical Hacker
15. ACK Scan
TACACS
Multipartite virus
-sA
encapsulation
16. An application that monitors a computer or network to identify - and prevent - malware. AV is usually signature-based - and can take multiple actions on defined malware files/activity.
Interior Gateway Protocol (IGP)
-PI
Antivirus (AV) software
spoofing
17. A denial-of-service attack where the attacker sends a ping to the network's broadcast address from the spoofed IP address of the target. All systems in the subnet then respond to the spoofed address - eventually flooding the device.
Smurf attack
Time exceeded
S
Media Access Control (MAC)
18. LM Hash for short passwords (under 7)
suicide hacker
Vulnerability
404EE
Overwhelm CAM table to convert switch to hub mode
19. ICMP Type/Code 0-0
Database
Echo Reply
Vulnerability Assessment
social engineering
20. A program or piece of code inserted into a system - usually covertly - with the intent of compromising the confidentiality - integrity - or availability of the victim's data - applications - or operating system. Malware consists of viruses - worms -
Malware
serialize scans & 0.4 sec wait
CIA triangle
Trojan Horse
21. An evaluation consisting of a document review - interviews - and demonstrations. No hands-on testing is performed.
false rejection rate (FRR)
parameter tampering
reconnaissance
Level I assessment
22. A communications protocol used for browsing the Internet.
Client
Hypertext Transfer Protocol (HTTP)
public key infrastructure (PKI)
SSH
23. An attacker who breaks into computer systems with malicious intent - without the owner's knowledge or permission.
Point-to-Point Protocol (PPP)
network interface card (NIC)
Black Hat
Active Fingerprinting
24. An attack that combines a brute-force attack with a dictionary attack.
Secure Multipurpose Mail Extension (S/MIME)
rule-based access control
hybrid attack
Asynchronous
25. NSA
National Security Agency
Black Hat
Vulnerability
Tunneling Virus
26. An Application layer protocol used primarily by Microsoft Windows to provide shared access to printers - files - and serial ports. It also provides an authenticated interprocess communication mechanism.
stream cipher
Domain Name System (DNS)
Common Internet File System/Server Message Block
Virus
27. A hybrid of the HTTP and SSL/TLS protocols that provides encrypted communication and secure identification of a web server.
Packet Internet Groper (ping)
Hypertext Transfer Protocol Secure (HTTPS)
Traceroute
false negative
28. A means of exchanging information from one entity to another using a process that does not provide an attacker the opportunity to reorder - delete - insert - or read information.
secure channel
symmetric algorithm
symmetric encryption
-sA
29. Recording the time - normally in a log file - when an event happens or when information is created or modified.
Domain Name System (DNS) lookup
Timestamping
Computer Emergency Response Team (CERT)
ISO 17799
30. The cyclical practice of identifying - classifying - remediating - and mitigating vulnerabilities.
Zenmap
halo effect
Vulnerability Management
Vulnerability Scanning
31. A business - government agency - or educational institution that provides access to the Internet.
Wi-Fi Protected Access (WPA)
replay attack
source routing
Internet service provider (ISP)
32. A type of denial-of-service attack where a hacker sends thousands of SYN packets to the target with spoofed IP addresses.
SYN attack
heuristic scanning
Bastion host
Zero Subnet
33. A security objective that ensures a resource can be accessed only by authorized users. This is also the property that sensitive information is not disclosed to unauthorized individuals - entities - or processes.
DNS
Point-to-Point Tunneling Protocol (PPTP)
Confidentiality
NT LAN Manager (NTLM)
34. A brand name of analog scrambling and de-scrambling equipment for cable and satellite television - invented primarily to keep consumer Television receive-only (TVRO) satellite equipment from receiving TV programming except on a subscription basis.
Data Encryption Standard (DES)
Multipartite virus
steganography
Videocipher II Satellite Encryption System
35. Describes practices in production and development that promote access to the end product's source materials.
R
open source
SYN flood attack
-sR
36. A connection-oriented - layer 4 protocol for transporting data over network segments. TCP is considered reliable because it guarantees delivery and the proper reordering of transmitted packets. This protocol is used for most long-haul traffic on the
ring topology
risk transference
Unicode
Transmission Control Protocol (TCP)
37. Cracking Tools
Tunneling
John the Ripper - LOphtcrack - Ophtcrack - Cain and Abel
route
Simple Mail Transfer Protocol (SMTP)
38. List Scan
-sL
audit
Data Link layer
Real application encompassing Trojan
39. A point-to-point connection between two endpoints created to exchangedata. Typically a tunnel is either an encrypted connection - or a connection using a protocol in a method for which it was not designed. An encrypted connection forms a point-to-poi
Tunnel
Tini
network access server
Algorithm
40. An attack against an authentication protocol in which the attacker intercepts data in transit along the network between the claimant and verifier - but does not alter the data (in other words - eavesdropping).
Post Office Protocol 3 (POP3)
Simple Object Access Protocol (SOAP)
passive attack
SSH
41. An Application layer protocol - using TCP - for transporting files across an Internet connection. FTP transmits in clear text.
File Transfer Protocol (FTP)
network access server
parallel scan
SSH
42. Network Scanning
steganography
A procedure for identifying active hosts on a network.
Bastion host
Internal access to the network
43. A method of permitting only MAC addresses in a preapproved list network access. Addresses not matching are blocked.
MAC filtering
Internet Assigned Number Authority (IANA)
Information Technology (IT) asset criticality
Mantrap
44. Port 161/162
User Datagram Protocol (UDP)
Decryption
SNMP
Hacks without permission
45. A self-replicating malicious program that attempts installation beneath antivirus software by directly intercepting the interrupt handlers of the operating system to evade detection.
false rejection rate (FRR)
Tunneling Virus
Internet Protocol (IP)
Active Directory (AD)
46. A mathematical operation requiring two binary inputs: If the inputs match - the output is a 0 - otherwise it is a 1.
packet filtering
Tumbling
Domain Name
XOR Operation
47. Authentication confirms the identity of the user or device. Authorization determines the privileges (rights) of the user or device. Accounting records the access attempts - both successful and unsuccessful.
Authentication - Authorization - and Accounting (AAA)
ISO 17799
RxBoot
-sP
48. The transmission of digital signals without precise clocking or synchronization.
Network Address Translation (NAT)
asynchronous transmission
gray hat
-oA
49. Actions - devices - procedures - techniques - or other measures intended to reduce the vulnerability of an information system.
Countermeasures
self encrypting
-sO
Detective Controls
50. Black hat
risk avoidance
Active Directory (AD)
Internet Control Message Protocol (ICMP)
Hacks without permission