SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A program or piece of code inserted into a system - usually covertly - with the intent of compromising the confidentiality - integrity - or availability of the victim's data - applications - or operating system. Malware consists of viruses - worms -
protocol stack
Malware
ring topology
stream cipher
2. A standard for encrypting e-mail - web pages - and other stream-oriented information transmitted over the Internet.
Institute of Electrical and Electronics Engineers (IEEE)
impersonation
Written Authorization
Transport Layer Security (TLS)
3. A three-step process computers execute to negotiate a connection with one another. The three steps are SYN - SYN/ACK - ACK.
Asymmetric
Syslog
Three-Way (TCP) Handshake
security kernel
4. A pen testing method where the attacker knows all information about the internal network. It is designed to simulate an attack by a disgruntled systems administrator - or similar level.
Address Resolution Protocol (ARP) table
White Box Testing
Kerberos
spam
5. A measurable - physical characteristic used to recognize the identity - or verify the claimed identity - of an applicant. Facial images - fingerprints - and handwriting samples are all examples of biometrics.
Access Control List (ACL)
initial sequence number (ISN)
Biometrics
Sign in Seal
6. Occurs when authorized users accumulate excess privileges on a system due to moving from position to position.
DNS
Administratively Prohibited
Access Creep
replay attack
7. The subjective - potential percentage of loss to a specific asset if a specific threat is realized. The exposure factor (EF) is a subjective value the person assessing risk must define.
Exposure Factor
piggybacking
CNAME record
overt channel
8. A brand name of analog scrambling and de-scrambling equipment for cable and satellite television - invented primarily to keep consumer Television receive-only (TVRO) satellite equipment from receiving TV programming except on a subscription basis.
Password Authentication Protocol (PAP)
Videocipher II Satellite Encryption System
Decryption
source routing
9. A one-way mathematical function that generates a fixedlength numerical string (hash) from a given data input. MD5 and SHA-1 are hashing algorithms.
hashing algorithm
Fraud and related activity in connection with computers
End User Licensing Agreement (EULA)
Sign in Seal
10. A file system used by the Mac OS.
Application Layer
Authorization
Cryptographic Key
Hierarchical File System (HFS)
11. Directing a protocol from one port to another.
nslookup
Exploit
port redirection
Three-Way (TCP) Handshake
12. A standard developed to enable routers to exchange messages containing information about routes to reach subnets in the network.
fully qualified domain name (FQDN)
patch
Routing Protocol
-PP
13. The process of using easily accessible DNS records to map a target network's internal hosts.
Whois
DNS enumeration
Internet Assigned Number Authority (IANA)
iris scanner
14. Looking over an authorized user's shoulder in order to steal information (such as authentication information).
security incident response team (SIRT)
honeynet
shoulder surfing
Smurf attack
15. Layer 6 of the OSI reference model. The Presentation layer ensures information sent by the Application layer of the sending system will be readable by the Application layer of the receiving system.
Audit Trail
Level III assessment
Presentation layer
War Chalking
16. As an identification device becomes more sensitive or accurate - its FAR decreases while its FRR increases. The CER is the point at which these two rates are equal - or cross over.
false rejection rate (FRR)
reverse social engineering
Extensible Authentication Protocol (EAP)
separation of duties
17. Layer 2 of the OSI reference model. This layer provides reliable transit of data across a physical link. The Data Link layer is concerned with physical addressing - network topology - access to the network medium - error detection - sequential delive
Data Link layer
Tumbling
POST
Bluesnarfing
18. The monetary value assigned to an IT asset.
R
SMB
Finding a directory listing and gaining access to a parent or root file for access to other files
Information Technology (IT) asset valuation
19. A hacking method for stealing the cookies used during a session build and replaying them for unauthorized connection purposes.
Demilitarized Zone (DMZ)
null session
sidejacking
-sU
20. Ping Scan
-sP
Telnet
Methodology
Request for Comments (RFC)
21. Hex 10
port scanning
Algorithm
A
Digital Watermarking
22. A text file stored within a browser by a web server that maintains information about the connection. Cookies are used to store information to maintain a unique but consistent surfing experience - but can also contain authentication parameters. Cookie
queue
audit
Simple Network Management Protocol (SNMP)
Cookie
23. Vulnerability Scanning
The automated process of proactively identifying vulnerabilities of computing systems present in a network
-oN
intrusion detection system (IDS)
Electronic serial number
24. A free and popular version of the Unix operating system.
Confidentiality
Mantrap
FreeBSD
open source
25. A nonnumerical - subjective risk evaluation. Used with qualitative assessment (an evaluation of risk that results in ratings of none - low - medium - and high for the probability.)
Tunneling Virus
net use \[target ip]IPC$ '' /user:''
remote procedure call (RPC)
qualitative analysis
26. A record showing which user has accessed a given resource and what operations the user performed during a given period.
-sU
Audit Trail
fragmentation
Covert Channel
27. A legal limit on the amount of financial liability and remedies the organization is responsible for taking on.
Kerberos
Buffer
Asymmetric Algorithm
limitation of liability and remedies
28. Normal scan timing
fragmentation
parallel scan
Auditing
Smurf attack
29. List Scan
Cryptographic Key
Rijndael
Biometrics
-sL
30. A set of rules defined by a system administrator that indicates whether access is allowed or denied to resource objects.
Defense in Depth
rule-based access control
queue
Request for Comments (RFC)
31. A unique hostname that is used to identify resources on the Internet. Domain names start with a root (.) - then add a top level (.com - .gov - or .mil - for example) - and a given name space.
Domain Name
Zero Subnet
Mandatory access control (MAC)
Electronic Code Book (ECB)
32. Sending unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobile phones - PDAs - or laptop computers.
Bluejacking
Network Address Translation (NAT)
Media Access Control (MAC)
suicide hacker
33. In computer security - this is an algorithm that uses separate keys for encryption and decryption.
Asymmetric Algorithm
Acknowledgment (ACK)
Black Hat
Cold Site
34. An approach to restricting system access to authorized users in which roles are created for various job functions. The permissions to perform certain operations are assigned to specific roles. Members of staff (or other system users) are assigned par
spyware
Fiber Distributed Data Interface (FDDI)
Temporal Key Integrity Protocol (TKIP)
role-based access control
35. A group of people - gathered together by a business entity - working to address a specific problem or goal.
false rejection rate (FRR)
Port Address Translation (PAT)
Tiger Team
Audit Trail
36. A protocol defining packets that are able to be routed by a router.
Data Link layer
routed protocol
SAM
John the Ripper - LOphtcrack - Ophtcrack - Cain and Abel
37. A piece of code intentionally inserted into a software system that will perform a malicious function when specified conditions are met at some future point.
Hierarchical File System (HFS)
logic bomb
Active Directory (AD)
Timestamping
38. A method of defining what rights and permissions an entity has to a given resource. In networking - Access Control Lists are commonly associated with firewall and router traffic filtering rules.
SNMP
Console Port
risk avoidance
Access Control List (ACL)
39. An informed decision to accept the potential for damage to or loss of an IT asset.
rogue access point
risk acceptance
Collision Domain
INFOSEC Assessment Methodology (IAM)
40. The monetary loss that can be expected for an asset due to risk over a one-year period. ALE is the product of the annual rate of occurrence (ARO) and the single loss expectancy (SLE). It is mathematically expressed as ALE = ARO
Annualized Loss Expectancy (ALE)
routed protocol
Worm
LDAP
41. Part of a service contract where the level of service is formally defined; may be required as part of the initial pen test agreements.
Port Address Translation (PAT)
Directory Traversal
Telnet
service level agreements (SLAs)
42. A method for detecting malicious code on a computer where the files are compared to signatures of known viruses stored in a database.
security bulletins
signature scanning
infrastructure mode
Black Box Testing
43. FIN Scan
Timestamping
-sF
promiscuous mode
hot site
44. The potential for damage to or loss of an IT asset
self encrypting
risk
A S
Secure Multipurpose Mail Extension (S/MIME)
45. An HTTP command to transmit text to a web server for processing. The opposite of an HTTP GET.
POST
Data Encryption Standard (DES)
RID Resource identifier
Address Resolution Protocol (ARP)
46. A remote control program in which the client runs on a local computer and connects to a remote server on a network. Commands entered locally are executed on the remote system.
symmetric encryption
Telnet
Service Set Identifier (SSID)
Finding a directory listing and gaining access to a parent or root file for access to other files
47. A widely used authentication protocol developed at the MassachusettsInstitute of Technology (MIT). Kerberos authentication uses tickets - Ticket Granting Service - and Key Distribution Center.
Kerberos
segment
Cracker
port scanning
48. Any item of value or worth to an organization - whether physical or virtual.
Routing Protocol
Asset
Presentation layer
network interface card (NIC)
49. A nontechnical method of hacking. Social engineering is the art of manipulating people - whether in person (human-based) or via computing methods (computer-based) - into providing sensitive information.
Digital Certificate
-sF
social engineering
Algorithm
50. A domain composed of all the systems sharing any given physical transport media. Systems within a collision domain may collide with each other during the transmission of data. Collisions can be managed by CSMA/CD (collision detection) or CSMA/CA (col
Address Resolution Protocol (ARP) table
Collision Domain
red team
private key