SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The combination of all IT assets - resources - components - and systems.
Asymmetric
Information Technology (IT) infrastructure
protocol stack
public key infrastructure (PKI)
2. Used for exchanging structured information - such as XML-based messages - in the implementation of web services
Crossover Error Rate (CER)
Interior Gateway Protocol (IGP)
Contingency Plan
Simple Object Access Protocol (SOAP)
3. The basis of this kind of security is that an individual user - or program operating on the user's behalf - is allowed to specify explicitly the types of access other users (or programs executing on their behalf) may have to information under the use
-oN
Digital Signature
network tap
Discretionary Access Control (DAC)
4. A host designed to collect data on suspicious activity.
site survey
SSH
Cloning
honeypot
5. The ability to trace actions performed on a system to a specific user or system entity.
polymorphic virus
Black Box Testing
Cryptography
Accountability
6. An Application layer protocol - using TCP - for transporting files across an Internet connection. FTP transmits in clear text.
Certificate Authority (CA)
XOR Operation
File Transfer Protocol (FTP)
smart card
7. Metamorphic Virus
nslookup
Self Replicating
firewall
route
8. A comparison metric for different biometric devices and technologies; the point at which the false acceptance rate (FAR) equals the
A series of messages sent by someone attempting to break into a computer to learn about the computer's network services.
Crossover Error Rate (CER)
Wiretapping
Directory Traversal
9. A value assigned to uniquely identify a single wide area network (WAN) in wireless LANs. SSIDs are broadcast by default - and are sent in the header of every packet. SSIDs provide no encryption or security.
intrusion detection system (IDS)
network operations center (NOC)
-PM
Service Set Identifier (SSID)
10. A mode of operation for a block cipher - with the characteristic that each possible block of plaintext has a defined corresponding ciphertext value - and vice versa
Finger
logic bomb
hash
Electronic Code Book (ECB)
11. A sublayer of layer 2 of the OSI model - the Data Link layer. It provides addressing and channel access control mechanisms that enable several terminals or network nodes to communicate within a multipoint network.
Domain Name System (DNS) lookup
Media Access Control (MAC)
Ethical Hacker
-oG
12. 18 U.S.C. 1029
security breach or security incident
Possession of access devices
Echo request
Database
13. Hashing algorithm that results in a 128-bit output.
Electronic Code Book (ECB)
MD5
Minimum acceptable level of risk
Fiber Distributed Data Interface (FDDI)
14. A background process found in Unix - Linux - Solaris - and other Unix-based operating systems.
Zenmap
Smurf attack
Daemon
End User Licensing Agreement (EULA)
15. IP Protocol Scan
-sO
parameter tampering
Hierarchical File System (HFS)
Black Hat
16. Controls internal to a system designed to resolve vulnerabilities and errors soon after they arise.
False Acceptance Rate (FAR)
Request for Comments (RFC)
remote access
Corrective Controls
17. A backlog of packets stored in buffers and waiting to be forwarded over an interface.
parallel scan
Telnet
port redirection
queue
18. A virus designed to infect the master boot record.
false rejection rate (FRR)
overt channel
Interior Gateway Protocol (IGP)
Master boot record infector
19. A documented process for a procedure designed to be consistent - repeatable - and accountable.
remote procedure call (RPC)
Methodology
POST
Directory Traversal
20. The monetary value expected from the occurrence of a risk on an asset. It is mathematically expressed as single loss expectancy (SLE) = asset value (AV)
802.11
Countermeasures
human-based social engineering
single loss expectancy (SLE)
21. A type of malware that covertly collects information about a user.
route
spyware
hot site
John the Ripper - LOphtcrack - Ophtcrack - Cain and Abel
22. Layer 2 of the OSI reference model. This layer provides reliable transit of data across a physical link. The Data Link layer is concerned with physical addressing - network topology - access to the network medium - error detection - sequential delive
Web Spider
RPC-DCOM
fragmentation
Data Link layer
23. List Scan
serialize scans & 15 sec wait
Sign in Seal
-sL
Daemon
24. A program designed to execute at a specific time to release malicious code onto the computer system or network.
key exchange protocol
NetBSD
Time Bomb
-PB
25. A point-to-point connection between two endpoints created to exchangedata. Typically a tunnel is either an encrypted connection - or a connection using a protocol in a method for which it was not designed. An encrypted connection forms a point-to-poi
-sO
Tunnel
Administratively Prohibited
steganography
26. FTP Bounce Attack
rule-based access control
-b
Level I assessment
Blowfish
27. A term trademarked by the Wi-Fi Alliance - used to define a standard for devices to use to connect to a wireless network.
gray hat
Distributed DoS (DDoS)
Wi-Fi
risk transference
28. nmap all output
Telnet
Bluetooth
-oA
Acceptable Use Policy (AUP)
29. A piece of code intentionally inserted into a software system that will perform a malicious function when specified conditions are met at some future point.
XOR Operation
hot site
logic bomb
firewall
30. Ping Scan
-sP
Adware
script kiddie
NT LAN Manager (NTLM)
31. The potential for damage to or loss of an IT asset
risk
Ciphertext
impersonation
Baseline
32. The process of recording activity on a system for monitoring and later review.
Address Resolution Protocol (ARP)
Auditing
Fraud and related activity in connection with computers
null session
33. An adapter that provides the physical connection to send and receive data between the computer and the network media.
network interface card (NIC)
remote access
routed protocol
A R
34. A tool that helps a company to compare its actual performance with its potential performance.
gap analysis
spoofing
Lightweight Directory Access Protocol (LDAP)
Eavesdropping
35. A security tool designed to protect a system or network against attacks by comparing traffic patterns against a list of both known attack signatures and general characteristics of how attacks may be carried out. Threats are rated and protective measu
--randomize_hosts -O OS fingerprinting
risk avoidance
intrusion prevention system (IPS)
Smurf attack
36. A computer placed outside a firewall to provide public services to other Internet sites - and hardened to resist external attacks.
suicide hacker
shrink-wrap code attacks
Reconnaissance - Scanning - Gaining Access - Maintaining Access - Covering Tracks
Bastion host
37. A software or hardware defect that often results in system vulnerabilities.
Bug
security breach or security incident
LDAP
HIDS
38. An organization's threshold for the seven areas of information security responsibility. This level is established based on the objectives for maintaining confidentiality - integrity - and availability of the organization's IT assets and infrastructur
Zenmap
Certificate Authority (CA)
security by obscurity
Minimum acceptable level of risk
39. A type of attack used to deny service to legitimate users of a network resource by intentionally overloading the network with illegitimate TCP connection requests. SYN packets are sent repeatedly to the target - but the corresponding SYN/ACK response
Detective Controls
session hijacking
Administratively Prohibited
SYN flood attack
40. A virus written in a macro language and usually embedded in document or spreadsheet files.
Pretty Good Privacy (PGP)
A R
spam
Macro virus
41. A computer system that performs tasks dictated by an attacker from a remote location. Zombies may be active or idle - and owners of the systems generally do not know their systems are compromised.
footprinting
spam
Active Fingerprinting
Zombie
42. Port 135
remote access
operating system attack
Serial Line Internet Protocol (SLIP)
RPC-DCOM
43. In penetration testing - enumeration is the act of querying a device or network segment thoroughly and systematically for information.
integrity
Vulnerability Management
Extensible Authentication Protocol (EAP)
enumeration
44. A form of fraud in which someone pretends to be someone else by assuming that person's identity - typically in order to access resources or obtain credit and other benefits in that person's name.
Level III assessment
Multipurpose Internet Mail Extensions (MIME)
security controls
identity theft
45. Nmap ml output
-oX
Access Creep
Kerberos
Computer-Based Attack
46. Layer 6 of the OSI reference model. The Presentation layer ensures information sent by the Application layer of the sending system will be readable by the Application layer of the receiving system.
site survey
source routing
Local Administrator
Presentation layer
47. Port 110
Availability
POP 3
Trapdoor Function
Hypertext Transfer Protocol Secure (HTTPS)
48. Any network incident that prompts some kind of log entry or other notification.
parameter tampering
single loss expectancy (SLE)
Replacing numbers in a url to access other files
Event
49. Independent review and examination of records and activities to assess the adequacy of system controls - to ensure compliance with established policies and operational procedures - and to recommend necessary changes.
audit
War Dialing
network access server
SNMP
50. An attack with the goal of preventing authorized users from accessing services and preventing the normal operation of computers and networks.
-P0
Denial of Service (DoS)
intrusion prevention system (IPS)
Bastion host