SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Monitoring of telephone or Internet conversations - typically by covert means.
Wiretapping
iris scanner
-b
Telnet
2. Controls to detect anomalies or undesirable events occurring on a system.
Detective Controls
Hypertext Transfer Protocol (HTTP)
Access Control List (ACL)
Internet Protocol (IP)
3. A standard developed to enable routers to exchange messages containing information about routes to reach subnets in the network.
network operations center (NOC)
footprinting
Audit Data
Routing Protocol
4. Self-contained network with a limited number of participants who extend limited trust to one another in order to accomplish an agreed-upon goal.
A procedure for identifying active hosts on a network.
intranet
Cache
Syslog
5. TCP connect() scan
packet
scope creep
-sT
audit
6. Hex 12
qualitative analysis
security by obscurity
A S
Open System Interconnection (OSI) Reference Model
7. Security measures - such as a locked door - perimeter fence - or security guard - to prevent or deter physical access to a facility - resource - or information stored on physical media.
physical security
shoulder surfing
Multipurpose Internet Mail Extensions (MIME)
-p <port ranges>
8. A protocol defining packets that are able to be routed by a router.
Hacks with permission
Service Set Identifier (SSID)
routed protocol
Internet Assigned Number Authority (IANA)
9. A backup facility with the electrical and physical components of a computer facility - but with no computer equipment in place. The site is ready to receive the necessary replacement computer equipment in the event the user has to move from his main
Cold Site
CIA triangle
Vulnerability Scanning
signature scanning
10. An Application layer protocol used primarily by Microsoft Windows to provide shared access to printers - files - and serial ports. It also provides an authenticated interprocess communication mechanism.
Internal access to the network
Common Internet File System/Server Message Block
ECHO reply
forwarding
11. The last portion of the SID that identifies the user to the system in Windows. A RID of 500 identifies the administrator account.
remote procedure call (RPC)
Port Address Translation (PAT)
Daisy Chaining
RID Resource identifier
12. An e-mail protection method using a secret message or image that can be referenced on any official communication with the site; if an e-mail is received without the image or message - the recipient knows it is not legitimate.
Destination Unreachable
Zone transfer
A R
Sign in Seal
13. A measurable - physical characteristic used to recognize the identity - or verify the claimed identity - of an applicant. Facial images - fingerprints - and handwriting samples are all examples of biometrics.
Eavesdropping
LDAP
Point-to-Point Tunneling Protocol (PPTP)
Biometrics
14. A unique hostname that is used to identify resources on the Internet. Domain names start with a root (.) - then add a top level (.com - .gov - or .mil - for example) - and a given name space.
Domain Name
Tunneling
Threat
Point-to-Point Protocol (PPP)
15. A device or service designed to obfuscate traffic between a client and the Internet. Generally used to make activity on the Internet as untraceable as possible.
Time Bomb
parameter tampering
Anonymizer
fragmentation
16. The rate at which a biometric system will incorrectly identify an unauthorized individual and allow them access (see false negative).
Confidentiality
Network Address Translation (NAT)
False Acceptance Rate (FAR)
HTTP
17. A type of DNS transfer - where all records from an SOA are transmitted to the requestor. Zone transfers have two options: full (opcode AXFR) and incremental (IXFR).
source routing
Zone transfer
halo effect
Domain Name System (DNS) lookup
18. The potential for damage to or loss of an IT asset
symmetric encryption
packet filtering
Level II assessment
risk
19. An organization composed of engineers - scientists - and students who issue standards related to electrical - electronic - and computer engineering.
Institute of Electrical and Electronics Engineers (IEEE)
Time Bomb
Client
Demilitarized Zone (DMZ)
20. Evaluation in which testers attempt to penetrate the network.
non-repudiation
Level III assessment
Malware
Written Authorization
21. An application that monitors a computer or network to identify - and prevent - malware. AV is usually signature-based - and can take multiple actions on defined malware files/activity.
Antivirus (AV) software
Point-to-Point Tunneling Protocol (PPTP)
local area network (LAN)
Eavesdropping
22. A set of rules defined by a system administrator that indicates whether access is allowed or denied to resource objects.
spyware
rule-based access control
Bastion host
Temporal Key Integrity Protocol (TKIP)
23. The monetary loss that can be expected for an asset due to risk over a one-year period. ALE is the product of the annual rate of occurrence (ARO) and the single loss expectancy (SLE). It is mathematically expressed as ALE = ARO
A S
Information Technology (IT) infrastructure
Annualized Loss Expectancy (ALE)
port scanning
24. An attack against an authentication protocol in which the attacker intercepts data in transit along the network between the claimant and verifier - but does not alter the data (in other words - eavesdropping).
Black Hat
passive attack
Community String
SID
25. Physical socket provided on routers and switches for cable connections between a computer and the router/switch. This connection enables the computer to configure - query - and troubleshoot the router/switch by use of a terminal emulator and a comman
Console Port
DNS enumeration
HTTP tunneling
Target Of Engagement (TOE)
26. Hashing algorithm that results in a 128-bit output.
MD5
Zone transfer
keylogger
Archive
27. don't ping
private key
Routing Protocol
footprinting
-P0
28. Layer 6 of the OSI reference model. The Presentation layer ensures information sent by the Application layer of the sending system will be readable by the Application layer of the receiving system.
heuristic scanning
parameter tampering
Discretionary Access Control (DAC)
Presentation layer
29. ICMP Type/Code 3-13
Administratively Prohibited
Reconnaissance - Scanning - Gaining Access - Maintaining Access - Covering Tracks
War Chalking
-sL
30. An Internet routing protocol used to exchange routing information within an autonomous system.
War Chalking
reverse social engineering
Bastion host
Interior Gateway Protocol (IGP)
31. An e-mail message warning users of a nonexistent virus and encouraging them to pass on the message to other users.
Warm Site
quality of service (QoS)
Virus Hoax
Blowfish
32. Polymorphic Virus
self encrypting
POST
Hypertext Transfer Protocol Secure (HTTPS)
Wi-Fi
33. A widely used authentication protocol developed at the MassachusettsInstitute of Technology (MIT). Kerberos authentication uses tickets - Ticket Granting Service - and Key Distribution Center.
Fraud and related activity in connection with computers
Kerberos
MAC filtering
Uniform Resource Locator (URL)
34. A symmetric key cryptographic algorithm that transforms a block of information at a time using a cryptographic key. For a block cipher algorithm - the length of the input block is the same as the length of the output block.
Block Cipher
Simple Object Access Protocol (SOAP)
Hacks without permission
Echo Reply
35. A sublayer of layer 2 of the OSI model - the Data Link layer. It provides addressing and channel access control mechanisms that enable several terminals or network nodes to communicate within a multipoint network.
Media Access Control (MAC)
quantitative risk assessment
hybrid attack
Whois
36. 1. The path a packet travels to reach the intended destination. Each individual device along the path traveled is called a hop. 2. Information contained on a device containing instructions for reaching other nodes on the network. This information can
Possession of access devices
Common Internet File System/Server Message Block
Data Link layer
route
37. A symmetric - block-cipher data-encryption standard that uses a variablelength key that can range from 32 bits to 448 bits.
Service Set Identifier (SSID)
Blowfish
A series of messages sent by someone attempting to break into a computer to learn about the computer's network services.
private key
38. A virus written in a macro language and usually embedded in document or spreadsheet files.
Macro virus
Exposure Factor
802.11
social engineering
39. A class of algorithms for cryptography that use the same cryptographic key for both decryption and encryption.
red team
route
--randomize_hosts -O OS fingerprinting
symmetric algorithm
40. The contents of a packet. A system attack requires the attacker to deliver a malicious payload that is acted upon and executed by the system.
Fast Ethernet
payload
private key
Availability
41. An attacker who breaks into computer systems with malicious intent - without the owner's knowledge or permission.
Cracker
Active Attack
Anonymizer
Black Hat
42. Controlling access to a network by analyzing the headers of incoming and outgoing packets - and letting them pass or discarding them based on rule sets created by a network administrator. A packet filter allows or denies packets based on destination
packet filtering
Self Replicating
Algorithm
802.11 i
43. Describes practices in production and development that promote access to the end product's source materials.
Telnet
patch
parallel scan & 75 sec timeout & 0.3 sec/probe
open source
44. An informed decision to accept the potential for damage to or loss of an IT asset.
Vulnerability Management
-sP
HTTP
risk acceptance
45. An attack technique that tricks your DNS server into believing it has received authentic information when - in reality - it has been provided fraudulent data. DNS cache poisoning affects user traffic by sending it to erroneous or malicious end points
Extensible Authentication Protocol (EAP)
DNS enumeration
Event
Domain Name System (DNS) cache poisoning
46. Any network incident that prompts some kind of log entry or other notification.
A
Event
packet
Tunneling Virus
47. A list of IP addresses and corresponding MAC addresses stored on a local computer.
Address Resolution Protocol (ARP) table
Common Internet File System/Server Message Block
risk
Zenmap
48. A type of denial-of-service attack where a hacker sends thousands of SYN packets to the target with spoofed IP addresses.
Address Resolution Protocol (ARP) table
initial sequence number (ISN)
DNS
SYN attack
49. A software license agreement; a contract between the 'licensor' and purchaser establishing the right to use the software.
Bluetooth
End User Licensing Agreement (EULA)
service level agreements (SLAs)
source routing
50. ICMP Netmask
-PM
identity theft
Information Technology (IT) security architecture and framework
hash