SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. An application that monitors a computer or network to identify - and prevent - malware. AV is usually signature-based - and can take multiple actions on defined malware files/activity.
Local Administrator
HTTP tunneling
Antivirus (AV) software
Bug
2. Malware designed to install some sort of virus - backdoor - and so on - on a target system.
Bug
nslookup
Presentation layer
Droppers
3. A storage buffer that transparently stores data so future requests for the same data can be served faster.
rootkit
-PI
Cache
encryption
4. A protocol defining packets that are able to be routed by a router.
Google hacking
-sO
-sF
routed protocol
5. A record showing which user has accessed a given resource and what operations the user performed during a given period.
Overwhelm CAM table to convert switch to hub mode
passive attack
Audit Trail
Challenge Handshake Authentication Protocol (CHAP)
6. A limited-function version of the Internetworking Operating System (IOS) - held in read-only memory in some earlier models of Cisco devices - capable of performing several seldom-needed low-level functions such as loading a new IOS into Flash memory
source routing
RxBoot
Information Technology (IT) security architecture and framework
Backdoor
7. Directing a protocol from one port to another.
false rejection rate (FRR)
routed protocol
inference attack
port redirection
8. An encryption standard designed by Joan Daemen and Vincent Rijmen. Chosen by a NIST contest to be the Advanced Encryption Standard (AES).
Rijndael
Ciphertext
Eavesdropping
Finding a directory listing and gaining access to a parent or root file for access to other files
9. An attack technique that tricks your DNS server into believing it has received authentic information when - in reality - it has been provided fraudulent data. DNS cache poisoning affects user traffic by sending it to erroneous or malicious end points
Extensible Authentication Protocol (EAP)
HTTP
hybrid attack
Domain Name System (DNS) cache poisoning
10. An authentication method on point-to-point links - using a three-way handshake and a mutually agreed-upon key.
Challenge Handshake Authentication Protocol (CHAP)
self encrypting
Cache
packet filtering
11. A programming principle whereby the last piece of data added to the stack is the first piece of data taken off.
Last In First Out (LIFO)
network access server
segment
parameter tampering
12. A virus written in a macro language and usually embedded in document or spreadsheet files.
Macro virus
U P F
risk transference
404EE
13. Used to find the domain name associated with an IP address; the opposite of a DNS lookup.
stateful packet filtering
Vulnerability Assessment
End User Licensing Agreement (EULA)
reverse lookup; reverse DNS lookup
14. A security protocol used in IEEE 802.11i to replace WEP without the requirement to replace legacy hardware.
Temporal Key Integrity Protocol (TKIP)
Methodology
Client
quantitative risk assessment
15. An informed decision to accept the potential for damage to or loss of an IT asset.
Hacks with permission
risk acceptance
Finger
Network Address Translation (NAT)
16. don't ping
Banner Grabbing
-P0
Wi-Fi Protected Access (WPA)
net use \[target ip]IPC$ '' /user:''
17. A term trademarked by the Wi-Fi Alliance - used to define a standard for devices to use to connect to a wireless network.
Interior Gateway Protocol (IGP)
A
Computer Emergency Response Team (CERT)
Wi-Fi
18. A value used to control cryptographic operations - such as decryption -encryption - signature generation - and signature verification.
-oG
Simple Network Management Protocol (SNMP)
Request for Comments (RFC)
Cryptographic Key
19. Conversion of plaintext to ciphertext through the use of a cryptographic algorithm.
encryption
Interior Gateway Protocol (IGP)
Confidentiality
Point-to-Point Protocol (PPP)
20. A measurable - physical characteristic used to recognize the identity - or verify the claimed identity - of an applicant. Facial images - fingerprints - and handwriting samples are all examples of biometrics.
Unicode
Access Creep
Biometrics
audit
21. An attack that combines a brute-force attack with a dictionary attack.
private network address
human-based social engineering
hashing algorithm
hybrid attack
22. In computer security - this is an algorithm that uses separate keys for encryption and decryption.
red team
Domain Name
Level I assessment
Asymmetric Algorithm
23. Port 88
Access Control List (ACL)
-sL
Kerberos
Post Office Protocol 3 (POP3)
24. A method of network traffic filtering that monitors the entire communications process - including the originator of the session and from which direction it started.
Serial Line Internet Protocol (SLIP)
role-based access control
stateful packet filtering
RxBoot
25. A network architecture framework developed by ISO that describes the communications process between two systems across the Internet in seven distinct layers.
Open System Interconnection (OSI) Reference Model
Telnet
security by obscurity
Annualized Loss Expectancy (ALE)
26. A point-to-point connection between two endpoints created to exchangedata. Typically a tunnel is either an encrypted connection - or a connection using a protocol in a method for which it was not designed. An encrypted connection forms a point-to-poi
Tunnel
network operations center (NOC)
firewalking
Unicode
27. 18 U.S.C. 1029
identity theft
risk
Possession of access devices
POST
28. An e-mail protection method using a secret message or image that can be referenced on any official communication with the site; if an e-mail is received without the image or message - the recipient knows it is not legitimate.
--randomize_hosts -O OS fingerprinting
hot site
Active Directory (AD)
Sign in Seal
29. A business - government agency - or educational institution that provides access to the Internet.
SYN flood attack
Internet service provider (ISP)
parameter tampering
DNS enumeration
30. A remote control program in which the client runs on a local computer and connects to a remote server on a network. Commands entered locally are executed on the remote system.
Audit Data
Routing Protocol
Telnet
quality of service (QoS)
31. A unit of information formatted according to specific protocols that allows precise transmittal of data from one network node to another. Also called a datagram or data packet - a packet contains a header (container) and a payload (contents). Any IP
Exposure Factor
non-repudiation
Information Technology Security Evaluation Criteria (ITSEC)
packet
32. Software that has advertisements embedded within. Generally displays ads in the form of pop-ups.
security kernel
Asymmetric Algorithm
Adware
Level I assessment
33. A function that is easy to compute in one direction - yet believed to be difficult to compute in the opposite direction (finding its inverse) without special information - called the 'trapdoor.' Widely used in cryptography.
Trapdoor Function
Electronic serial number
Access Creep
secure channel
34. The Security Accounts Manager file in Windows stores all the password hashes for the system.
SAM
U P F
Due Diligence
asynchronous transmission
35. Monitoring of telephone or Internet conversations - typically by covert means.
Digital Certificate
-sL
port redirection
Wiretapping
36. A three-step process computers execute to negotiate a connection with one another. The three steps are SYN - SYN/ACK - ACK.
Acceptable Use Policy (AUP)
-sS
Countermeasures
Three-Way (TCP) Handshake
37. RPC Scan
Data Link layer
-sR
Application Layer
firewall
38. A protocol used for sending and receiving log information for nodes on a network.
Syslog
Virtual Private Network (VPN)
Client
Wi-Fi Protected Access (WPA)
39. Shifting responsibility from one party to another
gap analysis
Accountability
quality of service (QoS)
risk transference
40. A backlog of packets stored in buffers and waiting to be forwarded over an interface.
queue
Application Layer
War Chalking
Time Bomb
41. A device set up to send a response on behalf of an end node to the requesting host. Proxies are generally used to obfuscate the host from the Internet.
Syslog
Web Spider
proxy server
Service Set Identifier (SSID)
42. A class of algorithms for cryptography that use the same cryptographic key for both decryption and encryption.
Banner Grabbing
Vulnerability
intranet
symmetric algorithm
43. A nonroutable IP address range intended for use only within the confines of a single organization - falling within the predefined ranges of 10.0.0.0 - 172.16-31.0.0 - or 192.168.0.0.
private network address
FreeBSD
Traceroute
A
44. Wireless LAN standards created by IEEE. 802.11a runs at up to 54Mbps at 5GHz - 802.11b runs at 11Mbps at 2.4GHz - 802.11g runs at 54Mbps at 2.4GHz - and 802.11n can run upwards of 150MBps.
802.11
footprinting
Routing Information Protocol (RIP)
File Transfer Protocol (FTP)
45. ICMP Type/Code 8
Echo request
enumeration
Uniform Resource Locator (URL)
POP 3
46. A file system used by the Mac OS.
private network address
Accountability
Access Control List (ACL)
Hierarchical File System (HFS)
47. A software license agreement; a contract between the 'licensor' and purchaser establishing the right to use the software.
security by obscurity
End User Licensing Agreement (EULA)
stateful packet filtering
Whois
48. ICMP Netmask
Level II assessment
Self Replicating
enumeration
-PM
49. Directory Transversal
RPC-DCOM
iris scanner
Finding a directory listing and gaining access to a parent or root file for access to other files
802.11 i
50. A connection-oriented - layer 4 protocol for transporting data over network segments. TCP is considered reliable because it guarantees delivery and the proper reordering of transmitted packets. This protocol is used for most long-haul traffic on the
Baseline
Buffer
iris scanner
Transmission Control Protocol (TCP)
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests