SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A security protocol used in IEEE 802.11i to replace WEP without the requirement to replace legacy hardware.
Buffer Overflow
passive attack
Syslog
Temporal Key Integrity Protocol (TKIP)
2. Manipulating a search string with additional specific operators to search for vulnerabilities or very specific information.
Google hacking
Anonymizer
-sW
A S
3. Sending unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobile phones - PDAs - or laptop computers.
Bluejacking
Acceptable Use Policy (AUP)
Internet Protocol Security (IPSec) architecture
private network address
4. A trusted entity that issues and revokes public key certificates. In a network - a CA is a trusted entity that issues - manages - and revokes security credentials and public keys for message encryption and/or authentication. Within a public key infra
Certificate Authority (CA)
site survey
Anonymizer
Methodology
5. The act of searching for Wi-Fi wireless networks by a person in a moving vehicle - using a portable device.
penetration testing
War Driving
payload
MD5
6. A group of penetration testers that assess the security of an organization - which is often unaware of the existence of the team or the exact assignment.
red team
Lightweight Directory Access Protocol (LDAP)
Boot Sector Virus
Kerberos
7. The contents of a packet. A system attack requires the attacker to deliver a malicious payload that is acted upon and executed by the system.
payload
ISO 17799
Destination Unreachable
Access Creep
8. A standard that provides best-practice recommendations on information security management for use by those responsible for initiating - implementing - or maintaining Information Security Management Systems (ISMS). Information security is defined with
firewalking
ISO 17799
private network address
Competitive Intelligence
9. A computer network confined to a relatively small area - such as a single building or campus.
Point-to-Point Protocol (PPP)
local area network (LAN)
-sF
quality of service (QoS)
10. An Application layer protocol for sending electronic mail between servers.
risk assessment
Simple Mail Transfer Protocol (SMTP)
Transport Layer Security (TLS)
Information Technology Security Evaluation Criteria (ITSEC)
11. A type of encryption where the same key is used to encrypt and decrypt the message.
Corrective Controls
symmetric encryption
Authentication Header (AH)
ECHO reply
12. A method in cryptography by which cryptographic keys are exchanged between users - allowing use of a cryptographic algorithm (for example - the Diffie-Hellman key exchange).
The automated process of proactively identifying vulnerabilities of computing systems present in a network
Uniform Resource Locator (URL)
key exchange protocol
-sF
13. An evaluation consisting of a document review - interviews - and demonstrations - as well as vulnerability scans and hands-on testing.
Level II assessment
Point-to-Point Tunneling Protocol (PPTP)
Back orifice
network interface card (NIC)
14. A firewall evasion technique whereby packets are wrapped in HTTP - as a covert channel to the target.
HTTP tunneling
NOP
Methodology
-sT
15. Black box test
Copyright
No previous knowledge of the network
-sA
Data Link layer
16. Policy stating what users of a system can and cannot do with the organization's assets.
phishing
gray box testing
human-based social engineering
Acceptable Use Policy (AUP)
17. Layer 6 of the OSI reference model. The Presentation layer ensures information sent by the Application layer of the sending system will be readable by the Application layer of the receiving system.
Presentation layer
network access server
public key
Bluetooth
18. Window Scan
Digital Signature
Vulnerability Assessment
separation of duties
-sW
19. The transmission of digital signals without precise clocking or synchronization.
intrusion prevention system (IPS)
Telnet
asynchronous transmission
-oX
20. FIN Scan
-sF
penetration testing
fully qualified domain name (FQDN)
intranet
21. Two or more LANs connected by a high-speed line across a large geographical area.
Wide Area Network (WAN)
protocol stack
Malware
hardware keystroke logger
22. Looking over an authorized user's shoulder in order to steal information (such as authentication information).
shoulder surfing
risk
enumeration
A R
23. The rate at which a biometric system will incorrectly reject an access attempt by an authorized user.
false rejection rate (FRR)
Simple Mail Transfer Protocol (SMTP)
-PM
Domain Name System (DNS) lookup
24. Metamorphic Virus
Cracker
Tini
identity theft
Self Replicating
25. A term representing the responsibility managers and their organizations have to provide information security to ensure the type of control - the cost of control - and the deployment of control are appropriate for the system being managed.
HTTP
Audit Data
separation of duties
Due Care
26. ex 02
-oX
segment
S
Discretionary Access Control (DAC)
27. A background process found in Unix - Linux - Solaris - and other Unix-based operating systems.
Rijndael
rogue access point
security breach or security incident
Daemon
28. A method used to prevent IDS detection by dividing the request into multiple parts that are sent in different packets
Videocipher II Satellite Encryption System
session splicing
Multipurpose Internet Mail Extensions (MIME)
net use \[target ip]IPC$ '' /user:''
29. Traffic-passing technique used by bridges and switches in which traffic received on an interface is sent out all interfaces on the device except the interface on which the information was originally received. Traffic on a switch is flooded when it is
port knocking
flood
Web Spider
Address Resolution Protocol (ARP) table
30. An attack against an authentication protocol in which the attacker intercepts data in transit along the network between the claimant and verifier - but does not alter the data (in other words - eavesdropping).
Event
hacktivism
passive attack
Acceptable Use Policy (AUP)
31. Attacks on the actual programming code of an application.
Application-Level Attacks
Hypertext Transfer Protocol Secure (HTTPS)
Digital Watermarking
flood
32. An agreement between the penetration tester and the client detailing the activities the tester is permitted to perform.
-sW
ECHO reply
Availability
Written Authorization
33. A communications protocol used for browsing the Internet.
Hypertext Transfer Protocol (HTTP)
Availability
network interface card (NIC)
ad hoc mode
34. A command that instructs the system processor to do nothing. Many overflow attacks involve stringing several NOP operations together (known as a NOP sled).
NOP
Simple Mail Transfer Protocol (SMTP)
Black Hat
Fiber Distributed Data Interface (FDDI)
35. An HTTP command to transmit text to a web server for processing. The opposite of an HTTP GET.
Internet Protocol (IP)
POST
risk assessment
fragmentation
36. An announcement - typically from a software vendor - of a known security vulnerability in a program; often the bulletin contains instructions for the application of a software patch.
security bulletins
Possession of access devices
Time exceeded
security controls
37. An attack that exploits the common mistake many people make when installing operating systems
private network address
Address Resolution Protocol (ARP)
operating system attack
reverse lookup; reverse DNS lookup
38. A storage buffer that transparently stores data so future requests for the same data can be served faster.
Hacks without permission
parallel scan & 75 sec timeout & 0.3 sec/probe
signature scanning
Cache
39. Provides router-to-router or host-to-network connections over asynchronous and synchronous circuits.
security controls
John the Ripper - LOphtcrack - Ophtcrack - Cain and Abel
SOA record
Point-to-Point Protocol (PPP)
40. A secret - typically consisting of only decimal digits - that a claimant memorizes and uses to authenticate his identity
personal identification number (PIN)
Smurf attack
port redirection
NOP
41. Start of Authority record. This record identifies the primary name server for the zone. The SOA record contains the host name of the server responsible for all DNS records within the namespace - as well as the basic properties of the domain.
SOA record
Replacing numbers in a url to access other files
-sI
-PI
42. The monetary value expected from the occurrence of a risk on an asset. It is mathematically expressed as single loss expectancy (SLE) = asset value (AV)
session hijacking
Interior Gateway Protocol (IGP)
-sO
single loss expectancy (SLE)
43. The secret portion of an asymmetric key pair typically used to decrypt or digitally sign data. The private key is never shared and is always used for decryption - with one notable exception: The private key is used to encrypt the digital signature.
Time To Live (TTL)
Overwhelm CAM table to convert switch to hub mode
private key
Availability
44. Formal description and evaluation of the vulnerabilities in an information system
Internet service provider (ISP)
Vulnerability Assessment
Tunneling Virus
Detective Controls
45. Drawing symbols in public places to alert others to an open Wi-Fi network. War chalking can include the SSIDs - administrative passwords to APs - and other information.
Wired Equivalent Privacy (WEP)
Brute-Force Password Attack
War Chalking
false rejection rate (FRR)
46. A computer security expert who performs security audits and penetration tests against systems or network segments - with the owner's full knowledge and permission - in an effort to increase security.
Ethical Hacker
Network Basic Input/Output System (NetBIOS)
Cracker
DNS enumeration
47. A measurable - physical characteristic used to recognize the identity - or verify the claimed identity - of an applicant. Facial images - fingerprints - and handwriting samples are all examples of biometrics.
intranet
White Box Testing
Information Technology (IT) security architecture and framework
Biometrics
48. Vulnerability Scanning
The automated process of proactively identifying vulnerabilities of computing systems present in a network
network interface card (NIC)
A
parallel scan & 300 sec timeout & 1.25 sec/probe
49. Content Addressable Memory table. Holds all the MAC-address-to-port mappings on a switch.
gap analysis
CAM table
Acknowledgment (ACK)
Third Party
50. The change or growth of a project's scope
Man-in-the-middle attack
Baseline
scope creep
Open System Interconnection (OSI) Reference Model