SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Formal description and evaluation of the vulnerabilities in an information system
Audit Trail
Uniform Resource Locator (URL)
Vulnerability Assessment
Information Technology (IT) asset criticality
2. A mode of operation for a block cipher - with the characteristic that each possible block of plaintext has a defined corresponding ciphertext value - and vice versa
-sW
router
Electronic Code Book (ECB)
script kiddie
3. A point-to-point connection between two endpoints created to exchangedata. Typically a tunnel is either an encrypted connection - or a connection using a protocol in a method for which it was not designed. An encrypted connection forms a point-to-poi
Ciphertext
audit
Tunnel
POST
4. nmap all output
Master boot record infector
sidejacking
Lightweight Directory Access Protocol (LDAP)
-oA
5. The act of dialing all numbers within an organization to discover open modems.
War Dialing
iris scanner
false rejection rate (FRR)
patch
6. An authentication method on point-to-point links - using a three-way handshake and a mutually agreed-upon key.
queue
HTTP tunneling
public key
Challenge Handshake Authentication Protocol (CHAP)
7. The use of deceptive computer-based means to trick individuals into disclosing sensitive personal information
S
-oG
phishing
private key
8. A symmetric key cipher where plaintext bits are combined with a pseudo-random cipher bit stream (keystream) - typically by an exclusive-or (XOR) operation. In a stream cipher the plaintext digits are encrypted one at a time - and the transformation o
gateway
reverse social engineering
stream cipher
Possession of access devices
9. A backup facility with the electrical and physical components of a computer facility - but with no computer equipment in place. The site is ready to receive the necessary replacement computer equipment in the event the user has to move from his main
Data Encryption Standard (DES)
SYN flood attack
-PB
Cold Site
10. Evaluation in which testers attempt to penetrate the network.
Level III assessment
false rejection rate (FRR)
Event
Kerberos
11. Host-based IDS. An IDS that resides on the host - protecting against file and folder manipulation and other host-based attacks and actions.
HIDS
Defines legal email marketing
Acknowledgment (ACK)
Local Administrator
12. A nonroutable IP address range intended for use only within the confines of a single organization - falling within the predefined ranges of 10.0.0.0 - 172.16-31.0.0 - or 192.168.0.0.
Institute of Electrical and Electronics Engineers (IEEE)
Secure Multipurpose Mail Extension (S/MIME)
local area network (LAN)
private network address
13. A measurable - physical characteristic used to recognize the identity - or verify the claimed identity - of an applicant. Facial images - fingerprints - and handwriting samples are all examples of biometrics.
Access Control List (ACL)
quantitative risk assessment
Biometrics
Interior Gateway Protocol (IGP)
14. A software or hardware defect that often results in system vulnerabilities.
Simple Network Management Protocol (SNMP)
shrink-wrap code attacks
Tunneling
Bug
15. Baseband LAN specification developed by Xerox Corporation - Intel - and Digital Equipment Corporation. One of the least expensive - most widely deployed networking standards; uses the CSMA/CD method of media access control.
Droppers
script kiddie
Ethernet
personal identification number (PIN)
16. An HTTP command to transmit text to a web server for processing. The opposite of an HTTP GET.
POST
Domain Name System (DNS) lookup
ECHO reply
parallel scan
17. A hardware device used to log keystrokes covertly. Hardware keystroke loggers are very dangerous due to the fact that they cannot be detected through regular software/anti-malware scanning.
MD5
out-of-band signaling
hardware keystroke logger
firewall
18. A standard developed to enable routers to exchange messages containing information about routes to reach subnets in the network.
-p <port ranges>
Confidentiality
Password Authentication Protocol (PAP)
Routing Protocol
19. A command that instructs the system processor to do nothing. Many overflow attacks involve stringing several NOP operations together (known as a NOP sled).
Routing Information Protocol (RIP)
Internal access to the network
NOP
spam
20. The ability to trace actions performed on a system to a specific user or system entity.
A
Active Attack
Accountability
reverse social engineering
21. Malicious code that uses a polymorphic engine to mutate while keeping the original algorithm intact; the code changes itself each time it runs - but the function of the code will not change.
Brute-Force Password Attack
Overwhelm CAM table to convert switch to hub mode
Filter
polymorphic virus
22. A query and response protocol widely used for querying databases that store the registered users or assignees of an Internet resource - such as a domain name - an IP address - or an autonomous system.
Network Basic Input/Output System (NetBIOS)
EDGAR database
RPC-DCOM
Whois
23. Any item of value or worth to an organization - whether physical or virtual.
node
POST
honeypot
Asset
24. A decision to reduce the potential for damage to or loss of an IT asset by taking some type of action
RxBoot
Access Point (AP)
red team
risk avoidance
25. A condition that occurs when more data is written to a buffer than it has space to store - and results in data corruption or other system errors. This is usually due to insufficient bounds checking - a bug - or improper configuration in the program c
Buffer Overflow
Presentation layer
-p <port ranges>
suicide hacker
26. Polite scan timing
Hypertext Transfer Protocol Secure (HTTPS)
serialize scans & 0.4 sec wait
CIA triangle
Mandatory access control (MAC)
27. A situation in which an IDS or other sensor triggers on an event as an intrusion attempt - when it was actually legitimate traffic.
Secure Sockets Layer (SSL)
-oX
false negative
Port Address Translation (PAT)
28. Chronological record of system activities to enable the reconstruction and examination of the sequence of events and changes in an event.
physical security
Media Access Control (MAC)
Echo Reply
Audit Data
29. 1. The path a packet travels to reach the intended destination. Each individual device along the path traveled is called a hop. 2. Information contained on a device containing instructions for reaching other nodes on the network. This information can
network operations center (NOC)
route
-oX
Worm
30. The cyclical practice of identifying - classifying - remediating - and mitigating vulnerabilities.
Vulnerability Management
risk avoidance
hybrid attack
Bit Flipping
31. A protocol that uses a private key to encrypt data before transmitting confidential documents over the Internet; widely used on e-commerce - banking - and other sites requiring privacy.
parameter tampering
-PS
Secure Sockets Layer (SSL)
Internet Protocol Security (IPSec) architecture
32. In penetration testing - this is a method of testing the security of a system or subnet without any previous knowledge of the device or network. Designed to simulate an attack by an outside intruder (usually from the Internet).
-sR
Black Box Testing
Internal access to the network
-PI
33. An Application layer protocol for sending electronic mail between servers.
RPC-DCOM
serialize scans & 15 sec wait
U P F
Simple Mail Transfer Protocol (SMTP)
34. Hex 12
quality of service (QoS)
A S
Eavesdropping
End User Licensing Agreement (EULA)
35. Access by information systems (or users) communicating from outside the information system security perimeter.
802.11
operating system attack
remote access
Active Directory (AD)
36. A penetration test in which the ethical hacker has limited knowledge of the intended target(s). Designed to simulate an internal - but non-systemadministrator-level attack.
gray box testing
Master boot record infector
public key infrastructure (PKI)
HTTP tunneling
37. Incremental Substitution
Replacing numbers in a url to access other files
Administratively Prohibited
Fraud and related activity in connection with computers
Anonymizer
38. Port 31337
-sU
initial sequence number (ISN)
Wired Equivalent Privacy (WEP)
Back orifice
39. The science or study of protecting information - whether in transit or at rest - by using techniques to render the information unusable to anyone who does not possess the means to decrypt it.
Application-Level Attacks
Cryptography
Certificate
proxy server
40. A method for detecting malicious code on a computer where the files are compared to signatures of known viruses stored in a database.
routed protocol
Certificate Authority (CA)
signature scanning
Bit Flipping
41. Nmap ml output
U P F
smart card
-oX
nslookup
42. A wireless LAN security standard developed by IEEE. Requires Temporal Key Integrity Protocol (TKIP) and Advanced Encryption Standard (AES).
Collision Domain
802.11 i
A R
replay attack
43. The exploitation of a security vulnerability
War Dialing
Master boot record infector
CNAME record
security breach or security incident
44. The means by which a recipient of a message can ensure the identity of the sender and that neither party can deny having sent or received the message. The most common method is through digital certificates.
Access Point (AP)
Replacing numbers in a url to access other files
non-repudiation
No previous knowledge of the network
45. Computer software or hardware that can intercept and log traffic passing over a digital network.
Black Hat
identity theft
sniffer
rogue access point
46. An attack against an authentication protocol in which the attacker intercepts data in transit along the network between the claimant and verifier - but does not alter the data (in other words - eavesdropping).
shoulder surfing
Target Of Engagement (TOE)
gap analysis
passive attack
47. A limit on the amount of time or number of iterations or transmissions in computer and network technology a packet can experience before it will be discarded.
Time To Live (TTL)
CIA triangle
-sF
Cold Site
48. The art and science of creating a covert message or image within another message - image - audio - or video file.
steganography
Possession of access devices
Ethical Hacker
piggybacking
49. ICMP Timestamp
-p <port ranges>
-PP
risk acceptance
session hijacking
50. A defined measure of service within a network system
Ethical Hacker
quality of service (QoS)
DNS enumeration
Presentation layer