SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. An organization's threshold for the seven areas of information security responsibility. This level is established based on the objectives for maintaining confidentiality - integrity - and availability of the organization's IT assets and infrastructur
Minimum acceptable level of risk
Competitive Intelligence
-P0
Sign in Seal
2. An anonymous connection to an administrative share (IPC$) on a Windows machine. Null sessions allow for enumeration of Windows machines - among other attacks.
Transport Layer Security (TLS)
null session
node
NetBSD
3. Malware designed to install some sort of virus - backdoor - and so on - on a target system.
John the Ripper - LOphtcrack - Ophtcrack - Cain and Abel
Address Resolution Protocol (ARP)
Hypertext Transfer Protocol (HTTP)
Droppers
4. Monitoring of telephone or Internet conversations - typically by covert means.
Wiretapping
CAM table
Eavesdropping
router
5. A Unix-like computer operating system descending from the BSD. Open-BSD includes a number of security features absent or optional in other operating systems.
pattern matching
DNS
local area network (LAN)
OpenBSD
6. An attack that combines a brute-force attack with a dictionary attack.
Annualized Loss Expectancy (ALE)
hybrid attack
hashing algorithm
serial scan & 300 sec wait
7. A communications channel that is being used for a purpose it was not intended for - usually to transfer information secretly.
Covert Channel
Daisy Chaining
TACACS
CAM table
8. Port 161/162
SNMP
FreeBSD
Computer-Based Attack
social engineering
9. Security identifier. The method by which Windows identifies user - group - and computer accounts for rights and permissions.
remote access
pattern matching
Corrective Controls
SID
10. A communications protocol used for browsing the Internet.
Countermeasures
Address Resolution Protocol (ARP)
A S
Hypertext Transfer Protocol (HTTP)
11. ICMP Type/Code 3
Banner Grabbing
Destination Unreachable
key exchange protocol
Internet Control Message Protocol (ICMP)
12. Software or firmware intended to perform an unauthorized process that will have an adverse impact on the confidentiality - integrity - or availability of an information system. A virus - worm - Trojan horse - or other code-based entity that infects a
Malicious code
gray hat
Boot Sector Virus
Exposure Factor
13. Computer software or hardware that can intercept and log traffic passing over a digital network.
-sF
sniffer
identity theft
Finding a directory listing and gaining access to a parent or root file for access to other files
14. A software program for remotely controlling a Microsoft Windows computer system over a network. Generally considered malware.
NetBus
-sS
Eavesdropping
Echo request
15. 18 U.S.C. 1029
Interior Gateway Protocol (IGP)
rogue access point
Administratively Prohibited
Possession of access devices
16. Attacks that take advantage of the built-in code and scripts most off-the-shelf applications come with.
Fiber Distributed Data Interface (FDDI)
shrink-wrap code attacks
routed protocol
Wi-Fi
17. Weakness in an information system - system security procedures - internal controls - or implementation that could be exploited or triggered by a threat source.
Vulnerability
Videocipher II Satellite Encryption System
Kerberos
Archive
18. Shifting responsibility from one party to another
Collision Domain
A series of messages sent by someone attempting to break into a computer to learn about the computer's network services.
risk transference
Routing Information Protocol (RIP)
19. Originally an extension of PPP - this is a protocol for authentication used within wireless networks. Works with multiple authentication measures.
source routing
Extensible Authentication Protocol (EAP)
Adware
Information Technology (IT) security architecture and framework
20. A technology where you advertise one IP address externally and data packets are rerouted to the appropriate IP address inside your network by a device providing translation services. In this way - IP addresses of machines on your internal network are
Replacing numbers in a url to access other files
Echo request
Network Address Translation (NAT)
Asymmetric
21. A domain composed of all the systems sharing any given physical transport media. Systems within a collision domain may collide with each other during the transmission of data. Collisions can be managed by CSMA/CD (collision detection) or CSMA/CA (col
-sL
Collision Domain
Asymmetric
port knocking
22. A formal set of rules describing data transmission - especially across a network. A protocol determines the type of error checking - the data compression method - how the sending device will indicate completion - how the receiving device will indicat
A S
Malware
NetBSD
protocol
23. A group of people - gathered together by a business entity - working to address a specific problem or goal.
Wireless Local Area Network (WLAN)
FreeBSD
Tiger Team
route
24. Looking over an authorized user's shoulder in order to steal information (such as authentication information).
Demilitarized Zone (DMZ)
shoulder surfing
CNAME record
Network Basic Input/Output System (NetBIOS)
25. A limit on the amount of time or number of iterations or transmissions in computer and network technology a packet can experience before it will be discarded.
HTTP
Time To Live (TTL)
port scanning
Packet Internet Groper (ping)
26. Version Detection Scan
Demilitarized Zone (DMZ)
Certificate Authority (CA)
-sV
Eavesdropping
27. An attack with the goal of preventing authorized users from accessing services and preventing the normal operation of computers and networks.
Level III assessment
Smurf attack
Denial of Service (DoS)
Malicious code
28. A security protocol used in IEEE 802.11i to replace WEP without the requirement to replace legacy hardware.
Digital Watermarking
flood
Tumbling
Temporal Key Integrity Protocol (TKIP)
29. A hybrid of the HTTP and SSL/TLS protocols that provides encrypted communication and secure identification of a web server.
serial scan & 300 sec wait
Hypertext Transfer Protocol Secure (HTTPS)
Droppers
inference attack
30. A computer placed outside a firewall to provide public services to other Internet sites - and hardened to resist external attacks.
Bastion host
A
replay attack
intrusion detection system (IDS)
31. An enumeration technique used to provide information about a computer system; generally used for operating system identification (also known as fingerprinting).
Denial of Service (DoS)
Banner Grabbing
Tumbling
promiscuous mode
32. Evaluation in which testers attempt to penetrate the network.
router
network interface card (NIC)
Level III assessment
SID
33. A mathematical operation requiring two binary inputs: If the inputs match - the output is a 0 - otherwise it is a 1.
Internet Protocol (IP)
Authentication
XOR Operation
Trusted Computer System Evaluation Criteria (TCSEC)
34. A software license agreement; a contract between the 'licensor' and purchaser establishing the right to use the software.
End User Licensing Agreement (EULA)
Eavesdropping
network access server
Information Technology (IT) infrastructure
35. A term representing the responsibility managers and their organizations have to provide information security to ensure the type of control - the cost of control - and the deployment of control are appropriate for the system being managed.
Address Resolution Protocol (ARP)
Echo request
Simple Mail Transfer Protocol (SMTP)
Due Care
36. Transmitting one protocol encapsulated inside another protocol.
Tunneling
Crossover Error Rate (CER)
Mantrap
HIDS
37. The default network authentication suite of protocols for Windows NT 4.0
NT LAN Manager (NTLM)
Antivirus (AV) software
Target Of Engagement (TOE)
rootkit
38. The process of sending a packet or frame toward the destination. In a switch - messages are forwarded only to the port they are addressed to.
parallel scan
serial scan & 300 sec wait
Third Party
forwarding
39. Establish Null Session
Application Layer
Wireless Local Area Network (WLAN)
LDAP
net use \[target ip]IPC$ '' /user:''
40. A decision to reduce the potential for damage to or loss of an IT asset by taking some type of action
Service Set Identifier (SSID)
Videocipher II Satellite Encryption System
OpenBSD
risk avoidance
41. The security property that data is not modified in an unauthorized and undetected manner. Also - the principle and measures taken to ensure that data received is in the exact same condition and state as when it was originally transmitted.
A S
ping sweep
integrity
false rejection rate (FRR)
42. A self-replicating malicious program that attempts installation beneath antivirus software by directly intercepting the interrupt handlers of the operating system to evade detection.
Minimum acceptable level of risk
intrusion prevention system (IPS)
Tunneling Virus
Client
43. Paranoid scan timing
Reconnaissance - Scanning - Gaining Access - Maintaining Access - Covering Tracks
Level III assessment
proxy server
serial scan & 300 sec wait
44. A storage buffer that transparently stores data so future requests for the same data can be served faster.
Ciphertext
Cache
White Box Testing
Virus
45. A security tool designed to protect a system or network against attacks by comparing traffic patterns against a list of both known attack signatures and general characteristics of how attacks may be carried out. Threats are rated and reported.
-sV
Antivirus (AV) software
A series of messages sent by someone attempting to break into a computer to learn about the computer's network services.
intrusion detection system (IDS)
46. Hex 10
risk avoidance
A
asynchronous transmission
Serial Line Internet Protocol (SLIP)
47. Sending unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobile phones - PDAs - or laptop computers.
payload
Bluejacking
Three-Way (TCP) Handshake
Level III assessment
48. A configuration of a network card that makes the card pass all traffic it receives to the central processing unit rather than just frames addressed to it
GET
honeypot
Electronic serial number
promiscuous mode
49. ICMP Type/Code 11
Port Address Translation (PAT)
stream cipher
Telnet
Time exceeded
50. The lack of clocking (imposed time ordering) on a bit stream.
Information Technology (IT) asset valuation
Asynchronous
Acknowledgment (ACK)
International Organization for Standardization (ISO)
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests