SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Any kind of connection that allows you to see all traffic passing by. Generally used in reference to a NIDS (network-based IDS) to monitor all traffic.
Syslog
Address Resolution Protocol (ARP) table
public key infrastructure (PKI)
network tap
2. A security tool designed to protect a system or network against attacks by comparing traffic patterns against a list of both known attack signatures and general characteristics of how attacks may be carried out. Threats are rated and reported.
intrusion detection system (IDS)
NetBus
Acceptable Use Policy (AUP)
Zenmap
3. A method of evaluating the security of a computer system or network by simulating an attack from a malicious source.
-PP
Lightweight Directory Access Protocol (LDAP)
penetration testing
segment
4. A symmetric - block-cipher data-encryption standard that uses a variablelength key that can range from 32 bits to 448 bits.
--randomize_hosts -O OS fingerprinting
Blowfish
iris scanner
node
5. Hex 12
intrusion detection system (IDS)
Internet service provider (ISP)
Anonymizer
A S
6. Also known as the dot-dot-slash attack. Using directory traversal - the attacker attempts to access restricted directories and execute commands outside intended web server directories by using the URL to redirect to an unintended folder location.
inference attack
Directory Traversal
hybrid attack
protocol
7. Baseband LAN specification developed by Xerox Corporation - Intel - and Digital Equipment Corporation. One of the least expensive - most widely deployed networking standards; uses the CSMA/CD method of media access control.
Ethernet
Hypertext Transfer Protocol Secure (HTTPS)
Wireless Local Area Network (WLAN)
Wi-Fi Protected Access (WPA)
8. FIN Scan
-sF
sniffer
smart card
-PB
9. Safeguards or countermeasures to avoid - counteract - or minimize security risks.
Finding a directory listing and gaining access to a parent or root file for access to other files
spam
SOA record
security controls
10. A point-to-point connection between two endpoints created to exchangedata. Typically a tunnel is either an encrypted connection - or a connection using a protocol in a method for which it was not designed. An encrypted connection forms a point-to-poi
Unicode
Tunnel
Real application encompassing Trojan
Authentication
11. A value used to control cryptographic operations - such as decryption -encryption - signature generation - and signature verification.
Computer Emergency Response Team (CERT)
protocol stack
Point-to-Point Tunneling Protocol (PPTP)
Cryptographic Key
12. IP Protocol Scan
Destination Unreachable
-sO
MD5
Access Creep
13. An electronic version of junk mail. Unsolicited commercial e-mail sent to numerous recipients.
ring topology
spam
Contingency Plan
Institute of Electrical and Electronics Engineers (IEEE)
14. The rate at which a biometric system will incorrectly identify an unauthorized individual and allow them access (see false negative).
False Acceptance Rate (FAR)
false negative
Community String
-PI
15. A series of documents and notes on standards used or proposed for use on the Internet; each is identified by a number.
Certificate
Minimum acceptable level of risk
gap analysis
Request for Comments (RFC)
16. The monetary value expected from the occurrence of a risk on an asset. It is mathematically expressed as single loss expectancy (SLE) = asset value (AV)
stateful packet filtering
Electronic Code Book (ECB)
single loss expectancy (SLE)
spam
17. A partially protected zone on a network - not exposed to the full fury of the Internet - but not fully behind the firewall. This technique is typically used on parts of the network that must remain open to the public (such as a web server) but must a
Demilitarized Zone (DMZ)
infrastructure mode
Open System Interconnection (OSI) Reference Model
-sU
18. Name given to expert groups that handle computer security incidents.
secure channel
Computer Emergency Response Team (CERT)
CAM table
qualitative analysis
19. Layer 7 of the OSI reference model. The Application layer provides services to applications - which allow them access to the network. Protocols such as FTP and SMTP reside here.
Cache
Application Layer
Unicode
NOP
20. A method used to prevent IDS detection by dividing the request into multiple parts that are sent in different packets
rootkit
session splicing
Real application encompassing Trojan
GET
21. The process of attaching a particular protocol header and trailer to a unit of data before transmission on the network. Occurs at layer 2 of the OSI reference model.
Interior Gateway Protocol (IGP)
Videocipher II Satellite Encryption System
A series of messages sent by someone attempting to break into a computer to learn about the computer's network services.
encapsulation
22. A Canonical Name record within DNS - used to provide an alias for a domain name.
proxy server
CNAME record
keylogger
CAM table
23. An Application layer protocol for sending electronic mail between servers.
Lightweight Directory Access Protocol (LDAP)
public key infrastructure (PKI)
Traceroute
Simple Mail Transfer Protocol (SMTP)
24. A protocol defining packets that are able to be routed by a router.
Echo request
routed protocol
signature scanning
Time To Live (TTL)
25. A mode of operation in a wireless LAN in which clients send data directly to one another without utilizing a wireless access point (WAP) - much like a point-to-point wired connection.
Whois
Wi-Fi Protected Access (WPA)
-sT
ad hoc mode
26. Another term for firewalking
gap analysis
port knocking
Due Care
Syslog
27. Method used by antivirus software to detect new - unknown viruses that have not yet been identified; based on a piece-by-piece examination of a program - looking for a sequence or sequences of instructions that differentiate the virus from 'normal' p
heuristic scanning
script kiddie
Password Authentication Protocol (PAP)
Zone transfer
28. Conversion of plaintext to ciphertext through the use of a cryptographic algorithm.
Eavesdropping
encryption
Detective Controls
Three-Way (TCP) Handshake
29. A programming principle whereby the last piece of data added to the stack is the first piece of data taken off.
Address Resolution Protocol (ARP)
session splicing
Asymmetric Algorithm
Last In First Out (LIFO)
30. An Internet Protocol Security (IPSec) header used to verify that the contents of a packet have not been modified while the packet was in transit.
initial sequence number (ISN)
footprinting
Authentication Header (AH)
Application Layer
31. ICMP Type/Code 3
Destination Unreachable
Daemon
footprinting
Dumpster Diving
32. A method in cryptography by which cryptographic keys are exchanged between users - allowing use of a cryptographic algorithm (for example - the Diffie-Hellman key exchange).
key exchange protocol
ring topology
Authorization
Minimum acceptable level of risk
33. A method for detecting malicious code on a computer where the files are compared to signatures of known viruses stored in a database.
Smurf attack
signature scanning
risk avoidance
Brute-Force Password Attack
34. A network architecture framework developed by ISO that describes the communications process between two systems across the Internet in seven distinct layers.
Asset
Open System Interconnection (OSI) Reference Model
serialize scans & 15 sec wait
Authentication - Authorization - and Accounting (AAA)
35. RPC Scan
payload
-sR
Finger
security bulletins
36. An approach to restricting system access to authorized users in which roles are created for various job functions. The permissions to perform certain operations are assigned to specific roles. Members of staff (or other system users) are assigned par
Information Technology (IT) security architecture and framework
role-based access control
MAC filtering
serial scan & 300 sec wait
37. Sending unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobile phones - PDAs - or laptop computers.
encryption
Bluejacking
rootkit
symmetric encryption
38. A business - government agency - or educational institution that provides access to the Internet.
Cloning
Reconnaissance - Scanning - Gaining Access - Maintaining Access - Covering Tracks
Internet service provider (ISP)
Internet Protocol (IP)
39. TCP SYN Scan
Simple Network Management Protocol (SNMP)
false negative
War Driving
-sS
40. The change or growth of a project's scope
scope creep
remote procedure call (RPC)
heuristic scanning
Echo request
41. The process of transforming ciphertext into plaintext through the use of a cryptographic algorithm.
Daemon
A series of messages sent by someone attempting to break into a computer to learn about the computer's network services.
security bulletins
Decryption
42. The process of pinging each address within a subnet to map potential targets. Ping sweeps are unreliable and easily detectable - but very fast.
Exploit
Virus
ping sweep
security bulletins
43. An API that provides services related to the OSI model's Session layer - allowing applications on separate computers to communicate over a LAN.
ECHO reply
U P F
Interior Gateway Protocol (IGP)
Network Basic Input/Output System (NetBIOS)
44. A social-engineering attack using computer resources - such as e-mail or IRC.
Bug
footprinting
Computer-Based Attack
symmetric algorithm
45. In computer security - this is an algorithm that uses separate keys for encryption and decryption.
reverse social engineering
802.11 i
session hijacking
Asymmetric Algorithm
46. A communications protocol used for browsing the Internet.
Hypertext Transfer Protocol (HTTP)
Digital Certificate
Cloning
Third Party
47. A stand-alone computer - kept off the network - that is used for scanning potentially malicious media or software.
gap analysis
human-based social engineering
rootkit
sheepdip
48. The act or actions of a hacker to put forward a cause or a political agenda - to affect some societal change - or to shed light on something he feels to be political injustice. These activities are usually illegal in nature.
hacktivism
self encrypting
remote procedure call (RPC)
Vulnerability Assessment
49. Port 161/162
Virtual Private Network (VPN)
Destination Unreachable
SNMP
Wi-Fi
50. A point of reference used to mark an initial state in order to manage change.
Point-to-Point Protocol (PPP)
Baseline
intranet
null session