SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Used to find the domain name associated with an IP address; the opposite of a DNS lookup.
Wired Equivalent Privacy (WEP)
integrity
reverse lookup; reverse DNS lookup
Defense in Depth
2. An encryption standard designed by Joan Daemen and Vincent Rijmen. Chosen by a NIST contest to be the Advanced Encryption Standard (AES).
TACACS
Rijndael
open source
Hierarchical File System (HFS)
3. A term representing the responsibility managers and their organizations have to provide information security to ensure the type of control - the cost of control - and the deployment of control are appropriate for the system being managed.
Due Care
risk
Asymmetric
-oA
4. The security property that data is not modified in an unauthorized and undetected manner. Also - the principle and measures taken to ensure that data received is in the exact same condition and state as when it was originally transmitted.
integrity
-sS
encapsulation
Application Layer
5. The process of using an application to remotely identify open ports on a system (for example - whether systems allow connections through those ports).
scope creep
port scanning
Password Authentication Protocol (PAP)
ISO 17799
6. In penetration testing - this is a method of testing the security of a system or subnet without any previous knowledge of the device or network. Designed to simulate an attack by an outside intruder (usually from the Internet).
Tunnel
Bastion host
Cryptographic Key
Black Box Testing
7. nmap
Rijndael
-p <port ranges>
Transmission Control Protocol (TCP)
Collision Domain
8. The secret portion of an asymmetric key pair typically used to decrypt or digitally sign data. The private key is never shared and is always used for decryption - with one notable exception: The private key is used to encrypt the digital signature.
intrusion detection system (IDS)
sidejacking
Third Party
private key
9. Activities to determine the extent to which a security control is implemented correctly - operating as intended - and producing the desired outcome with respect to meeting the security requirements for the system.
infrastructure mode
non-repudiation
Ethical Hacker
Assessment
10. The means by which a recipient of a message can ensure the identity of the sender and that neither party can deny having sent or received the message. The most common method is through digital certificates.
non-repudiation
risk acceptance
Zenmap
sheepdip
11. ex 02
Domain Name
S
RID Resource identifier
-oN
12. A record showing which user has accessed a given resource and what operations the user performed during a given period.
gap analysis
Blowfish
Audit Trail
Community String
13. Idlescan
-sI
source routing
security incident response team (SIRT)
Network Address Translation (NAT)
14. A point-to-point connection between two endpoints created to exchangedata. Typically a tunnel is either an encrypted connection - or a connection using a protocol in a method for which it was not designed. An encrypted connection forms a point-to-poi
Data Link layer
Three-Way (TCP) Handshake
spyware
Tunnel
15. The monetary value expected from the occurrence of a risk on an asset. It is mathematically expressed as single loss expectancy (SLE) = asset value (AV)
Certificate
single loss expectancy (SLE)
Replacing numbers in a url to access other files
gateway
16. Transmitting one protocol encapsulated inside another protocol.
script kiddie
Tunneling
steganography
network access server
17. Provides router-to-router or host-to-network connections over asynchronous and synchronous circuits.
POP 3
spyware
Bit Flipping
Point-to-Point Protocol (PPP)
18. When an authorized person allows (intentionally or unintentionally) someone to pass through a secure door - despite the fact that the intruder does not have a badge.
iris scanner
False Acceptance Rate (FAR)
piggybacking
hardware keystroke logger
19. A value used to control cryptographic operations - such as decryption -encryption - signature generation - and signature verification.
Cryptographic Key
RPC-DCOM
false negative
Ethernet
20. A set of related communications protocols operating together as a group to address communication at some or all of the seven layers of the OSI reference model.
S
protocol stack
Internet service provider (ISP)
security by obscurity
21. An Application layer protocol for sending electronic mail between servers.
integrity
personal identification number (PIN)
False Acceptance Rate (FAR)
Simple Mail Transfer Protocol (SMTP)
22. A network architecture framework developed by ISO that describes the communications process between two systems across the Internet in seven distinct layers.
Asymmetric
patch
gray box testing
Open System Interconnection (OSI) Reference Model
23. Management policy and procedures designed to maintain or restore business operations - including computer operations - possibly at an alternate location - in the event of emergencies - system failures - or disaster.
POP 3
network operations center (NOC)
NOP
Contingency Plan
24. A host designed to collect data on suspicious activity.
honeypot
-oA
packet filtering
Malware
25. A pen testing method where the attacker knows all information about the internal network. It is designed to simulate an attack by a disgruntled systems administrator - or similar level.
White Box Testing
Copyright
sidejacking
Local Administrator
26. An authentication method on point-to-point links - using a three-way handshake and a mutually agreed-upon key.
heuristic scanning
Challenge Handshake Authentication Protocol (CHAP)
Internet Protocol (IP)
Port Address Translation (PAT)
27. Layer 6 of the OSI reference model. The Presentation layer ensures information sent by the Application layer of the sending system will be readable by the Application layer of the receiving system.
Presentation layer
Application Layer
Discretionary Access Control (DAC)
Dumpster Diving
28. An attack in which a hacker steps between two ends of an already-established communication session and uses specialized tools to guess sequence numbers to take over the channel.
single loss expectancy (SLE)
CAM table
-sS
session hijacking
29. A storage buffer that transparently stores data so future requests for the same data can be served faster.
Port Address Translation (PAT)
network interface card (NIC)
Time exceeded
Cache
30. A network traffic management technique designed to allow applications to specify the route a packet will take to a destination - regardless of what the route tables between the two systems say.
Methodology
integrity
source routing
Replacing numbers in a url to access other files
31. A NAT method in which multiple internal hosts - using private IP addressing - can be mapped through a single public IP address using the session IDs and port numbers. An internal global IP address can support in excess of 65 -000 concurrent TCP and U
Buffer
Port Address Translation (PAT)
Fast Ethernet
SYN attack
32. An organized collection of data.
Database
Transmission Control Protocol (TCP)
SOA record
separation of duties
33. Manipulating a search string with additional specific operators to search for vulnerabilities or very specific information.
shrink-wrap code attacks
Rijndael
steganography
Google hacking
34. A non-self-replicating program that appears to have a useful purpose - but in reality has a different - malicious purpose.
A procedure for identifying active hosts on a network.
Real application encompassing Trojan
Trojan Horse
footprinting
35. Authentication confirms the identity of the user or device. Authorization determines the privileges (rights) of the user or device. Accounting records the access attempts - both successful and unsuccessful.
Authentication - Authorization - and Accounting (AAA)
serialize scans & 15 sec wait
Application Layer
operating system attack
36. A type 0 ICMP message used to reply to ECHO requests. Used with ping to verify network layer connectivity between hosts.
Service Set Identifier (SSID)
stateful packet filtering
ECHO reply
Serial Line Internet Protocol (SLIP)
37. Actions - devices - procedures - techniques - or other measures intended to reduce the vulnerability of an information system.
Countermeasures
Ethical Hacker
Request for Comments (RFC)
Vulnerability Scanning
38. A standard for encrypting e-mail - web pages - and other stream-oriented information transmitted over the Internet.
Serial Line Internet Protocol (SLIP)
Transport Layer Security (TLS)
NT LAN Manager (NTLM)
The automated process of proactively identifying vulnerabilities of computing systems present in a network
39. A communications path - such as the Internet - authorized for data transmission within a computer system or network.
risk assessment
overt channel
A
CNAME record
40. The process of pinging each address within a subnet to map potential targets. Ping sweeps are unreliable and easily detectable - but very fast.
hot site
Cryptographic Key
Master boot record infector
ping sweep
41. Port 137/138/139
Defense in Depth
Computer-Based Attack
SMB
TACACS
42. An e-mail message warning users of a nonexistent virus and encouraging them to pass on the message to other users.
Virus Hoax
Droppers
quality of service (QoS)
fragmentation
43. A software program for remotely controlling a Microsoft Windows computer system over a network. Generally considered malware.
NetBus
Administratively Prohibited
human-based social engineering
Interior Gateway Protocol (IGP)
44. Ports 20/21
Virus
Copyright
A series of messages sent by someone attempting to break into a computer to learn about the computer's network services.
FTP
45. A Canonical Name record within DNS - used to provide an alias for a domain name.
Asynchronous
CNAME record
Cold Site
-sL
46. Describes practices in production and development that promote access to the end product's source materials.
open source
-sS
ISO 17799
Collision
47. A protocol that allows a client computer to request services from a server and the server to return the results.
sidejacking
Worm
personal identification number (PIN)
remote procedure call (RPC)
48. A self-replicating malicious program that attempts installation beneath antivirus software by directly intercepting the interrupt handlers of the operating system to evade detection.
Tunneling Virus
Wrapper
Corrective Controls
RPC-DCOM
49. SYN Ping
Information Technology Security Evaluation Criteria (ITSEC)
Finding a directory listing and gaining access to a parent or root file for access to other files
-PS
Telnet
50. A measurable - physical characteristic used to recognize the identity - or verify the claimed identity - of an applicant. Facial images - fingerprints - and handwriting samples are all examples of biometrics.
Access Creep
Temporal Key Integrity Protocol (TKIP)
Network Address Translation (NAT)
Biometrics