SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A point-to-point connection between two endpoints created to exchangedata. Typically a tunnel is either an encrypted connection - or a connection using a protocol in a method for which it was not designed. An encrypted connection forms a point-to-poi
Tunnel
network interface card (NIC)
Address Resolution Protocol (ARP) table
risk acceptance
2. Polymorphic Virus
Transport Layer Security (TLS)
self encrypting
HTTP tunneling
limitation of liability and remedies
3. A penetration test in which the ethical hacker has limited knowledge of the intended target(s). Designed to simulate an internal - but non-systemadministrator-level attack.
Archive
gray box testing
Trapdoor Function
Written Authorization
4. An attack that combines a brute-force attack with a dictionary attack.
-sU
Third Party
hybrid attack
Ciphertext
5. A means of exchanging information from one entity to another using a process that does not provide an attacker the opportunity to reorder - delete - insert - or read information.
logic bomb
NetBus
secure channel
Target Of Engagement (TOE)
6. The process of transforming ciphertext into plaintext through the use of a cryptographic algorithm.
private key
rule-based access control
Decryption
Ethernet
7. Hex 14
Address Resolution Protocol (ARP) table
Archive
HTTP tunneling
A R
8. A social-engineering effort in which the attacker pretends to be an employee - a valid user - or even an executive to elicit information or access.
Daisy Chaining
Administratively Prohibited
impersonation
session splicing
9. A computer system that performs tasks dictated by an attacker from a remote location. Zombies may be active or idle - and owners of the systems generally do not know their systems are compromised.
Internal access to the network
Whois
Zombie
Last In First Out (LIFO)
10. The concept of having more than one person required to complete a task
Multipurpose Internet Mail Extensions (MIME)
separation of duties
remote procedure call (RPC)
Directory Traversal
11. Manipulating a search string with additional specific operators to search for vulnerabilities or very specific information.
signature scanning
Syslog
Google hacking
Kerberos
12. Actions - devices - procedures - techniques - or other measures intended to reduce the vulnerability of an information system.
-sV
gray box testing
Black Box Testing
Countermeasures
13. An Application layer protocol used primarily by Microsoft Windows to provide shared access to printers - files - and serial ports. It also provides an authenticated interprocess communication mechanism.
Common Internet File System/Server Message Block
Block Cipher
-oX
open source
14. A protocol used for sending and receiving log information for nodes on a network.
Overwhelm CAM table to convert switch to hub mode
Syslog
Address Resolution Protocol (ARP)
SOA record
15. A storage buffer that transparently stores data so future requests for the same data can be served faster.
-sR
ISO 17799
Cache
ad hoc mode
16. Also known as a public key certificate - this is an electronic file that is used to verify a user's identity - providing non-repudiation throughout the sys-tem. Certificates contain the entity's public key - serial number - version - subject - algori
payload
Digital Certificate
Accountability
Address Resolution Protocol (ARP) table
17. The process of determining if a network entity (user or service) is legitimate
Authentication
private key
shrink-wrap code attacks
Fraud and related activity in connection with computers
18. Hex 12
passive attack
hashing algorithm
A S
MD5
19. A command used in HTTP and FTP to retrieve a file from a server.
-b
private network address
net use \[target ip]IPC$ '' /user:''
GET
20. A set of rules defined by a system administrator that indicates whether access is allowed or denied to resource objects.
infrastructure mode
Audit Data
Antivirus (AV) software
rule-based access control
21. The process of using an application to remotely identify open ports on a system (for example - whether systems allow connections through those ports).
Authentication - Authorization - and Accounting (AAA)
Antivirus (AV) software
port scanning
Malware
22. A portion of memory used to temporarily store output or input data.
Buffer
overt channel
Cache
Collision Domain
23. A mode of operation for a block cipher - with the characteristic that each possible block of plaintext has a defined corresponding ciphertext value - and vice versa
route
Electronic Code Book (ECB)
iris scanner
symmetric algorithm
24. A defined measure of service within a network system
SYN flood attack
route
quality of service (QoS)
SID
25. A nonnumerical - subjective risk evaluation. Used with qualitative assessment (an evaluation of risk that results in ratings of none - low - medium - and high for the probability.)
Tiger Team
HIDS
qualitative analysis
Data Link layer
26. Steps taken to identify and limit risks to an acceptable or reasonable level of exposure.
security bulletins
Due Diligence
Bluetooth
Network Basic Input/Output System (NetBIOS)
27. A computer process that requests a service from another computer and accepts the server's responses.
Defines legal email marketing
hot site
penetration testing
Client
28. A denial-of-service attack where the attacker sends a ping to the network's broadcast address from the spoofed IP address of the target. All systems in the subnet then respond to the spoofed address - eventually flooding the device.
Hacks with permission
Internet Control Message Protocol (ICMP)
Smurf attack
Acceptable Use Policy (AUP)
29. A group of experts that handles computer security incidents.
Back orifice
security incident response team (SIRT)
-P0
Tunneling
30. Layer 2 of the OSI reference model. This layer provides reliable transit of data across a physical link. The Data Link layer is concerned with physical addressing - network topology - access to the network medium - error detection - sequential delive
Cryptographic Key
Data Link layer
patch
Countermeasures
31. A person or entity indirectly involved in a relationship between two principles.
Third Party
forwarding
steganography
Information Technology (IT) security architecture and framework
32. A computer network confined to a relatively small area - such as a single building or campus - in which devices connect through high-frequency radio waves using IEEE standard 802.11.
Buffer
Wireless Local Area Network (WLAN)
self encrypting
hashing algorithm
33. Conversion of plaintext to ciphertext through the use of a cryptographic algorithm.
encryption
-sA
Bluetooth
Syslog
34. A unique numerical string - created by a hashing algorithm on a given piece of data - used to verify data integrity. Generally hashes are used to verify the integrity of files after download (comparison to the hash value on the site before download)
hash
802.11
-sX
LDAP
35. An extensible mechanism for e-mail. A variety of MIME types exist for sending content such as audio - binary - or video using the Simple Mail Transfer Protocol (SMTP).
EDGAR database
Multipurpose Internet Mail Extensions (MIME)
-sP
Hierarchical File System (HFS)
36. A utility that sends an ICMP Echo message to determine if a specific IP address is accessible; if the message receives a reply - the address is reachable.
gray box testing
firewalking
hot site
Packet Internet Groper (ping)
37. ICMP Type/Code 11
spoofing
Time exceeded
quality of service (QoS)
Uniform Resource Locator (URL)
38. A NAT method in which multiple internal hosts - using private IP addressing - can be mapped through a single public IP address using the session IDs and port numbers. An internal global IP address can support in excess of 65 -000 concurrent TCP and U
Archive
Level I assessment
Port Address Translation (PAT)
port knocking
39. A one-way mathematical function that generates a fixedlength numerical string (hash) from a given data input. MD5 and SHA-1 are hashing algorithms.
hashing algorithm
CAM table
ad hoc mode
-sT
40. Wrapper or Binder
hacktivism
social engineering
Password Authentication Protocol (PAP)
Real application encompassing Trojan
41. Terminal Access Controller Access-Control System. A remote authentication protocol that is used to communicate with an authentication server commonly used in Unix networks.
Zone transfer
TACACS
A procedure for identifying active hosts on a network.
Virus
42. An attack in which a hacker steps between two ends of an already-established communication session and uses specialized tools to guess sequence numbers to take over the channel.
Data Encryption Standard (DES)
session hijacking
Routing Protocol
Tumbling
43. Controlling access to a network by analyzing the headers of incoming and outgoing packets - and letting them pass or discarding them based on rule sets created by a network administrator. A packet filter allows or denies packets based on destination
packet filtering
-p <port ranges>
Brute-Force Password Attack
Audit Data
44. A self-replicating malicious program that attempts installation beneath antivirus software by directly intercepting the interrupt handlers of the operating system to evade detection.
Tunneling Virus
Telnet
Internet Protocol Security (IPSec) architecture
Anonymizer
45. A limited-function version of the Internetworking Operating System (IOS) - held in read-only memory in some earlier models of Cisco devices - capable of performing several seldom-needed low-level functions such as loading a new IOS into Flash memory
RxBoot
out-of-band signaling
heuristic scanning
audit
46. A method of permitting only MAC addresses in a preapproved list network access. Addresses not matching are blocked.
overt channel
Information Technology (IT) asset criticality
MAC filtering
parallel scan
47. A network architecture framework developed by ISO that describes the communications process between two systems across the Internet in seven distinct layers.
inference attack
-sA
Block Cipher
Open System Interconnection (OSI) Reference Model
48. A software program for remotely controlling a Microsoft Windows computer system over a network. Generally considered malware.
Information Technology (IT) asset criticality
parallel scan
NetBus
honeynet
49. The conveying of official access or legal power to a person or entity.
Cryptography
Authorization
Asynchronous
Bit Flipping
50. A computer network confined to a relatively small area - such as a single building or campus.
Master boot record infector
network access server
signature scanning
local area network (LAN)