SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Controls to detect anomalies or undesirable events occurring on a system.
scope creep
Detective Controls
Network Address Translation (NAT)
-PB
2. A fully qualified domain name consists of a host and domain name - including a top-level domain such as .com - .net - .mil - .edu -and so on.
keylogger
Banner Grabbing
fully qualified domain name (FQDN)
-PS
3. An Internet Protocol Security (IPSec) header used to verify that the contents of a packet have not been modified while the packet was in transit.
Cookie
Authentication Header (AH)
Trusted Computer Base (TCB)
User Datagram Protocol (UDP)
4. The process of determining if a network entity (user or service) is legitimate
Authentication
Black Box Testing
DNS
Hypertext Transfer Protocol (HTTP)
5. An Ethernet networking system transmitting data at 100 million bits per second (Mbps) - 10 times the speed of an earlier Ethernet standard. Derived from the Ethernet 802.3 standard - it is also known as 100BaseT.
Availability
private network address
Fast Ethernet
quantitative risk assessment
6. Another term for firewalking
port knocking
Trapdoor Function
logic bomb
route
7. The steps taken to gather evidence and information on the targets you wish to attack.
intrusion detection system (IDS)
reconnaissance
Collision Domain
Threat
8. A computer security expert who performs security audits and penetration tests against systems or network segments - with the owner's full knowledge and permission - in an effort to increase security.
gateway
Ethical Hacker
Master boot record infector
Digital Watermarking
9. A nonroutable IP address range intended for use only within the confines of a single organization - falling within the predefined ranges of 10.0.0.0 - 172.16-31.0.0 - or 192.168.0.0.
hashing algorithm
private network address
Annualized Loss Expectancy (ALE)
packet
10. The level of importance assigned to an IT asset
Worm
S
Password Authentication Protocol (PAP)
Information Technology (IT) asset criticality
11. UDP Scan
Third Party
-sU
Bluesnarfing
Domain Name System (DNS) lookup
12. A protocol for transporting data packets across a packet switched internetwork (such as the Internet). IP is a routed protocol.
Active Attack
Simple Mail Transfer Protocol (SMTP)
Internet Protocol (IP)
hardware keystroke logger
13. ICMP Timestamp
-sO
-PP
site survey
Acceptable Use Policy (AUP)
14. A social-engineering attack using computer resources - such as e-mail or IRC.
--randomize_hosts -O OS fingerprinting
Vulnerability
Third Party
Computer-Based Attack
15. A method of permitting only MAC addresses in a preapproved list network access. Addresses not matching are blocked.
piggybacking
Virus Hoax
MAC filtering
Cloning
16. The act of using numerous electronic serial numbers on a cell phone until a valid number is located.
-PP
reconnaissance
fragmentation
Tumbling
17. Software used to bind a Trojan and a legitimate program together so the Trojan will be installed when the legitimate program is executed.
Wrapper
Tunneling Virus
qualitative analysis
-oX
18. Any kind of connection that allows you to see all traffic passing by. Generally used in reference to a NIDS (network-based IDS) to monitor all traffic.
Authentication - Authorization - and Accounting (AAA)
Request for Comments (RFC)
packet
network tap
19. Using conversation or some other interaction between people to gather useful information.
Extensible Authentication Protocol (EAP)
human-based social engineering
Filter
Confidentiality
20. Formal description and evaluation of the vulnerabilities in an information system
Cryptographic Key
Vulnerability Assessment
risk assessment
Reconnaissance - Scanning - Gaining Access - Maintaining Access - Covering Tracks
21. The monetary loss that can be expected for an asset due to risk over a one-year period. ALE is the product of the annual rate of occurrence (ARO) and the single loss expectancy (SLE). It is mathematically expressed as ALE = ARO
Trusted Computer Base (TCB)
Buffer
Annualized Loss Expectancy (ALE)
Secure Multipurpose Mail Extension (S/MIME)
22. Attacks on the actual programming code of an application.
spyware
Application-Level Attacks
rogue access point
RPC-DCOM
23. A virus that plants itself in a system's boot sector and infects the master boot record.
Electronic Code Book (ECB)
Echo Reply
firewall
Boot Sector Virus
24. An information assurance strategy in which multiple layers of defense are placed throughout an Information Technology system.
promiscuous mode
Defense in Depth
Finding a directory listing and gaining access to a parent or root file for access to other files
Tunneling
25. The condition of a resource being ready for use and accessible by authorized users.
Certificate
-oN
Level II assessment
Availability
26. Confidentiality - Integrity - and Availability are the three aspects of security and make up the triangle.
Corrective Controls
CIA triangle
Internet Protocol Security (IPSec) architecture
Bit Flipping
27. Hashing algorithm that results in a 128-bit output.
promiscuous mode
Malicious code
Digital Certificate
MD5
28. Provides router-to-router or host-to-network connections over asynchronous and synchronous circuits.
Demilitarized Zone (DMZ)
-sW
Point-to-Point Protocol (PPP)
Annualized Loss Expectancy (ALE)
29. Controls internal to a system designed to resolve vulnerabilities and errors soon after they arise.
Corrective Controls
Exploit
Google hacking
limitation of liability and remedies
30. A collection of historical records or the place where they are kept. In computing - an archive generally refers to backup copies of logs and/or data.
-PM
Archive
DNS
A R
31. A security tool designed to protect a system or network against attacks by comparing traffic patterns against a list of both known attack signatures and general characteristics of how attacks may be carried out. Threats are rated and reported.
Computer Emergency Response Team (CERT)
intrusion detection system (IDS)
enumeration
Packet Internet Groper (ping)
32. A connectionless - layer 4 transport protocol. UDP is faster than TCP - but offers no reliability. A best effort is made to deliver the data - but no checks and verifications are performed to guarantee delivery. Therefore - UDP is termed a 'connectio
keylogger
Block Cipher
RID Resource identifier
User Datagram Protocol (UDP)
33. An attack that exploits the common mistake many people make when installing operating systems
-sL
honeynet
S
operating system attack
34. A partially protected zone on a network - not exposed to the full fury of the Internet - but not fully behind the firewall. This technique is typically used on parts of the network that must remain open to the public (such as a web server) but must a
steganography
flood
Macro virus
Demilitarized Zone (DMZ)
35. ICMP Type/Code 3-13
shrink-wrap code attacks
Administratively Prohibited
asynchronous transmission
penetration testing
36. PI and PT Ping
-PB
Man-in-the-middle attack
local area network (LAN)
shoulder surfing
37. A social-engineering attack that manipulates the victim into calling the attacker for help.
intrusion detection system (IDS)
Methodology
risk
reverse social engineering
38. A function that is easy to compute in one direction - yet believed to be difficult to compute in the opposite direction (finding its inverse) without special information - called the 'trapdoor.' Widely used in cryptography.
key exchange protocol
Tini
Database
Trapdoor Function
39. An evaluation consisting of a document review - interviews - and demonstrations. No hands-on testing is performed.
phishing
quality of service (QoS)
Cloning
Level I assessment
40. A group of experts that handles computer security incidents.
honeypot
security incident response team (SIRT)
-sR
firewall
41. A distance-vector routing protocol that employs the hop count as a routing metric. The 'hold down time -' used to define how long a route is held in memory - is 180 seconds. RIP prevents routing loops by implementing a limit on the number of hops all
Finger
-sS
Routing Information Protocol (RIP)
network operations center (NOC)
42. In a classful IPv4 subnet - this is the network number with all binary 0s in the subnet part of the number. When written in decimal - the zero subnet has the same number as the classful network number.
OpenBSD
INFOSEC Assessment Methodology (IAM)
Zero Subnet
-sX
43. A networking configuration where all nodes are connected in a circle with no terminated ends on the cable.
-oN
ring topology
Challenge Handshake Authentication Protocol (CHAP)
Daemon
44. A method of evaluating the security of a computer system or network by simulating an attack from a malicious source.
queue
-sT
-PM
penetration testing
45. Transmitting one protocol encapsulated inside another protocol.
Acceptable Use Policy (AUP)
site survey
XOR Operation
Tunneling
46. A tool that helps a company to compare its actual performance with its potential performance.
infrastructure mode
Copyright
gap analysis
Level III assessment
47. Transmission using channels or frequencies outside those normally used for data transfer; often used for error reporting.
Traceroute
out-of-band signaling
firewall
Interior Gateway Protocol (IGP)
48. Start of Authority record. This record identifies the primary name server for the zone. The SOA record contains the host name of the server responsible for all DNS records within the namespace - as well as the basic properties of the domain.
Videocipher II Satellite Encryption System
Annualized Loss Expectancy (ALE)
Timestamping
SOA record
49. A protocol used for sending and receiving log information for nodes on a network.
Decryption
hot site
Distributed DoS (DDoS)
Syslog
50. A computer process that requests a service from another computer and accepts the server's responses.
Fraud and related activity in connection with computers
Client
Bug
Access Control List (ACL)