SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. White hat
Tiger Team
hardware keystroke logger
Hacks with permission
Information Technology (IT) asset criticality
2. A biometric device that uses pattern-recognition techniques based on images of the irises of an individual's eyes.
Annualized Loss Expectancy (ALE)
iris scanner
Uniform Resource Locator (URL)
integrity
3. The means by which a recipient of a message can ensure the identity of the sender and that neither party can deny having sent or received the message. The most common method is through digital certificates.
Bug
Authentication - Authorization - and Accounting (AAA)
non-repudiation
Cryptographic Key
4. LM Hash for short passwords (under 7)
SOA record
replay attack
404EE
Internet service provider (ISP)
5. A tool that helps a company to compare its actual performance with its potential performance.
False Acceptance Rate (FAR)
gap analysis
stream cipher
Internet Control Message Protocol (ICMP)
6. A hybrid of the HTTP and SSL/TLS protocols that provides encrypted communication and secure identification of a web server.
hacktivism
Denial of Service (DoS)
Hypertext Transfer Protocol Secure (HTTPS)
honeynet
7. Xmas Tree scan
Multipurpose Internet Mail Extensions (MIME)
-sX
Challenge Handshake Authentication Protocol (CHAP)
Daisy Chaining
8. A Canonical Name record within DNS - used to provide an alias for a domain name.
CNAME record
nslookup
War Dialing
network tap
9. In penetration testing - this is a method of testing the security of a system or subnet without any previous knowledge of the device or network. Designed to simulate an attack by an outside intruder (usually from the Internet).
Authentication - Authorization - and Accounting (AAA)
Black Box Testing
limitation of liability and remedies
Wiretapping
10. Two or more LANs connected by a high-speed line across a large geographical area.
Wide Area Network (WAN)
RID Resource identifier
Tunneling Virus
segment
11. Traffic-passing technique used by bridges and switches in which traffic received on an interface is sent out all interfaces on the device except the interface on which the information was originally received. Traffic on a switch is flooded when it is
Zero Subnet
reverse lookup; reverse DNS lookup
Information Technology (IT) security architecture and framework
flood
12. An Internet routing protocol used to exchange routing information within an autonomous system.
penetration testing
Zone transfer
INFOSEC Assessment Methodology (IAM)
Interior Gateway Protocol (IGP)
13. A card with a built-in microprocessor and memory used for identification or financial transactions. The card transfers data to and from a central computer when inserted into a reader.
Corrective Controls
Access Creep
sidejacking
smart card
14. The act of dialing all numbers within an organization to discover open modems.
War Dialing
Active Directory (AD)
honeypot
port redirection
15. In a classful IPv4 subnet - this is the network number with all binary 0s in the subnet part of the number. When written in decimal - the zero subnet has the same number as the classful network number.
Zero Subnet
-p <port ranges>
infrastructure mode
parameter tampering
16. An industry standard protocol used for accessing and managing information within a directory service; an application protocol for querying and modifying data using directory services running over TCP/IP.
quantitative risk assessment
Lightweight Directory Access Protocol (LDAP)
Anonymizer
Information Technology (IT) asset criticality
17. A command that instructs the system processor to do nothing. Many overflow attacks involve stringing several NOP operations together (known as a NOP sled).
Mantrap
NOP
Assessment
Telnet
18. Shifting responsibility from one party to another
-oX
FreeBSD
social engineering
risk transference
19. A method of falsely identifying the source of data packets; often used by hackers to make it difficult to trace where an attack originated.
spoofing
Finger
Countermeasures
Data Link layer
20. A type of malware that covertly collects information about a user.
802.11
spyware
replay attack
Authentication Header (AH)
21. CAN-SPAM
POP 3
qualitative analysis
Interior Gateway Protocol (IGP)
Defines legal email marketing
22. An Application layer protocol for sending electronic mail between servers.
Third Party
Simple Mail Transfer Protocol (SMTP)
Access Point (AP)
personal identification number (PIN)
23. A connectionless - layer 4 transport protocol. UDP is faster than TCP - but offers no reliability. A best effort is made to deliver the data - but no checks and verifications are performed to guarantee delivery. Therefore - UDP is termed a 'connectio
node
Time exceeded
User Datagram Protocol (UDP)
risk assessment
24. A symmetric - block-cipher data-encryption standard that uses a variablelength key that can range from 32 bits to 448 bits.
Time To Live (TTL)
private key
U P F
Blowfish
25. An electronic version of junk mail. Unsolicited commercial e-mail sent to numerous recipients.
Covert Channel
Open System Interconnection (OSI) Reference Model
-PB
spam
26. UDP Scan
protocol stack
ECHO reply
enumeration
-sU
27. A penetration test in which the ethical hacker has limited knowledge of the intended target(s). Designed to simulate an internal - but non-systemadministrator-level attack.
SOA record
Directory Traversal
gray box testing
private network address
28. An adapter that provides the physical connection to send and receive data between the computer and the network media.
red team
Antivirus (AV) software
network interface card (NIC)
initial sequence number (ISN)
29. A method for detecting malicious code on a computer where the files are compared to signatures of known viruses stored in a database.
signature scanning
ring topology
non-repudiation
Community String
30. Layer 6 of the OSI reference model. The Presentation layer ensures information sent by the Application layer of the sending system will be readable by the Application layer of the receiving system.
Presentation layer
Ethernet
Tiger Team
-PS
31. A method of network traffic filtering that monitors the entire communications process - including the originator of the session and from which direction it started.
stateful packet filtering
quality of service (QoS)
Time To Live (TTL)
smart card
32. ICMP Type/Code 3-13
Simple Network Management Protocol (SNMP)
Virtual Private Network (VPN)
Administratively Prohibited
Overwhelm CAM table to convert switch to hub mode
33. A symmetric key cryptographic algorithm that transforms a block of information at a time using a cryptographic key. For a block cipher algorithm - the length of the input block is the same as the length of the output block.
Block Cipher
iris scanner
HIDS
OpenBSD
34. TCP SYN Scan
hashing algorithm
-sS
Post Office Protocol 3 (POP3)
reverse lookup; reverse DNS lookup
35. The subjective - potential percentage of loss to a specific asset if a specific threat is realized. The exposure factor (EF) is a subjective value the person assessing risk must define.
Exposure Factor
risk avoidance
U P F
security breach or security incident
36. A principle in security engineering that attempts to use anonymity and secrecy (of design - implementation - and so on) to provide security; the footprint of the organization - entity - network - or system is kept as small as possible to avoid intere
intrusion prevention system (IPS)
port scanning
Syslog
security by obscurity
37. A fully operational off-site data-processing facility equipped with hardware and system software to be used in the event of a disaster.
hot site
-sL
packet
port redirection
38. Black hat
Local Administrator
Certificate Authority (CA)
ping sweep
Hacks without permission
39. An evaluation consisting of a document review - interviews - and demonstrations. No hands-on testing is performed.
Time exceeded
Level I assessment
footprinting
risk
40. A software license agreement; a contract between the 'licensor' and purchaser establishing the right to use the software.
steganography
End User Licensing Agreement (EULA)
Authentication - Authorization - and Accounting (AAA)
-oN
41. Safeguards or countermeasures to avoid - counteract - or minimize security risks.
Defines legal email marketing
Defense in Depth
security controls
Malicious code
42. Software used to bind a Trojan and a legitimate program together so the Trojan will be installed when the legitimate program is executed.
Wrapper
enumeration
Internet Protocol Security (IPSec) architecture
-oN
43. The process of pinging each address within a subnet to map potential targets. Ping sweeps are unreliable and easily detectable - but very fast.
No previous knowledge of the network
local area network (LAN)
ping sweep
Temporal Key Integrity Protocol (TKIP)
44. Terminal Access Controller Access-Control System. A remote authentication protocol that is used to communicate with an authentication server commonly used in Unix networks.
ad hoc mode
Acknowledgment (ACK)
Information Technology (IT) infrastructure
TACACS
45. A decision to reduce the potential for damage to or loss of an IT asset by taking some type of action
802.11 i
Vulnerability Management
risk avoidance
Institute of Electrical and Electronics Engineers (IEEE)
46. When an authorized person allows (intentionally or unintentionally) someone to pass through a secure door - despite the fact that the intruder does not have a badge.
Event
piggybacking
footprinting
local area network (LAN)
47. Used for exchanging structured information - such as XML-based messages - in the implementation of web services
remote procedure call (RPC)
Simple Object Access Protocol (SOAP)
risk transference
-sL
48. Layer 7 of the OSI reference model. The Application layer provides services to applications - which allow them access to the network. Protocols such as FTP and SMTP reside here.
Asymmetric Algorithm
encapsulation
Application Layer
Zenmap
49. MAC Flooding
Overwhelm CAM table to convert switch to hub mode
private key
Cryptographic Key
initial sequence number (ISN)
50. A widely used authentication protocol developed at the MassachusettsInstitute of Technology (MIT). Kerberos authentication uses tickets - Ticket Granting Service - and Key Distribution Center.
Copyright
Electronic Code Book (ECB)
protocol
Kerberos