SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A class of algorithms for cryptography that use the same cryptographic key for both decryption and encryption.
symmetric algorithm
-PS
Daisy Chaining
hacktivism
2. A fully operational off-site data-processing facility equipped with hardware and system software to be used in the event of a disaster.
fragmentation
hot site
Tunneling
false negative
3. A fully qualified domain name consists of a host and domain name - including a top-level domain such as .com - .net - .mil - .edu -and so on.
Acknowledgment (ACK)
ring topology
fully qualified domain name (FQDN)
Authentication
4. A U.S. Department of Defense (DoD) standard that sets basic requirements for assessing the effectiveness of computer security controls built into a computer system.
security bulletins
Trusted Computer System Evaluation Criteria (TCSEC)
Internal access to the network
DNS enumeration
5. A wireless access point that has either been installed on a secure company network without explicit authorization from a local network administrator - or has been created to allow a hacker to conduct a man-in-the-middle attack.
rogue access point
Covert Channel
parallel scan & 300 sec timeout & 1.25 sec/probe
Finger
6. A type of malware that covertly collects information about a user.
polymorphic virus
-sU
-sF
spyware
7. An attack in which the hacker can derive information from the ciphertext without actually decoding it. Sensitive information can be considered compromised if an adversary can infer its real value with a high level of confidence.
Redundant Array of Independent Disks (RAID)
Hierarchical File System (HFS)
Google hacking
inference attack
8. A utility that sends an ICMP Echo message to determine if a specific IP address is accessible; if the message receives a reply - the address is reachable.
remote procedure call (RPC)
Packet Internet Groper (ping)
ring topology
Network Address Translation (NAT)
9. A program designed to browse websites in an automated - methodical manner. Sometimes these programs are used to harvest information from websites - such as e-mail addresses.
Web Spider
RxBoot
scope creep
SAM
10. An attack that combines a brute-force attack with a dictionary attack.
SNMP
Zenmap
Defines legal email marketing
hybrid attack
11. A command that instructs the system processor to do nothing. Many overflow attacks involve stringing several NOP operations together (known as a NOP sled).
-oA
NOP
remote procedure call (RPC)
Daisy Chaining
12. A method of external testing whereby several systems or resources are used together to effect an attack.
Presentation layer
Daisy Chaining
SYN flood attack
service level agreements (SLAs)
13. Name given to expert groups that handle computer security incidents.
intranet
Computer Emergency Response Team (CERT)
Macro virus
Blowfish
14. A computer process that requests a service from another computer and accepts the server's responses.
Client
-PT
patch
-sL
15. Whether purposeful or the result of malware or other attack - a backdoor is a hidden capability in a system or program for bypassing normal computer authentication systems.
Backdoor
gray hat
asynchronous transmission
packet
16. A small Trojan program that listens on port 777.
Tini
Time To Live (TTL)
Wireless Local Area Network (WLAN)
Daemon
17. A symmetric - block-cipher data-encryption standard that uses a variablelength key that can range from 32 bits to 448 bits.
Echo Reply
Blowfish
Block Cipher
parallel scan
18. The organization that governs the Internet's top-level domains - IP address allocation - and port number assignments.
Audit Trail
NetBus
-sS
Internet Assigned Number Authority (IANA)
19. The public portion of an asymmetric key pair typically used to encrypt data or verify signatures. Public keys are shared and are used to encrypt messages.
replay attack
public key
802.11
session splicing
20. Also known as a public key certificate - this is an electronic file that is used to verify a user's identity - providing non-repudiation throughout the sys-tem. Certificates contain the entity's public key - serial number - version - subject - algori
operating system attack
Countermeasures
Tunneling Virus
Digital Certificate
21. An Application layer protocol - using TCP - for transporting files across an Internet connection. FTP transmits in clear text.
NetBSD
File Transfer Protocol (FTP)
Access Point (AP)
Self Replicating
22. The contents of a packet. A system attack requires the attacker to deliver a malicious payload that is acted upon and executed by the system.
Virus Hoax
payload
Unicode
Tunneling
23. A means of exchanging information from one entity to another using a process that does not provide an attacker the opportunity to reorder - delete - insert - or read information.
Trusted Computer Base (TCB)
secure channel
Application-Level Attacks
red team
24. An early network application that provides information on users currently logged on to a machine.
Finger
HTTP tunneling
Tunneling Virus
Baseline
25. Sending packets or requests to another system to gain information to be used to identify weaknesses and protect the system from attacks.
Vulnerability Scanning
local area network (LAN)
Daemon
parameter tampering
26. The use of deceptive computer-based means to trick individuals into disclosing sensitive personal information
Access Control List (ACL)
Wireless Local Area Network (WLAN)
phishing
intrusion detection system (IDS)
27. Incremental Substitution
Digital Certificate
Replacing numbers in a url to access other files
Due Diligence
security kernel
28. A nonroutable IP address range intended for use only within the confines of a single organization - falling within the predefined ranges of 10.0.0.0 - 172.16-31.0.0 - or 192.168.0.0.
Wide Area Network (WAN)
-sW
private network address
Timestamping
29. Policy stating what users of a system can and cannot do with the organization's assets.
parallel scan & 300 sec timeout & 1.25 sec/probe
Zone transfer
Acceptable Use Policy (AUP)
risk
30. ICMP Type/Code 3-13
Asynchronous
Administratively Prohibited
Access Point (AP)
Uniform Resource Locator (URL)
31. Layer 2 of the OSI reference model. This layer provides reliable transit of data across a physical link. The Data Link layer is concerned with physical addressing - network topology - access to the network medium - error detection - sequential delive
Zero Subnet
HTTP
Data Link layer
hardware keystroke logger
32. Conversion of plaintext to ciphertext through the use of a cryptographic algorithm.
Destination Unreachable
encryption
NetBSD
Smurf attack
33. FIN Scan
-sF
public key
Virus
stream cipher
34. A piece of code intentionally inserted into a software system that will perform a malicious function when specified conditions are met at some future point.
Echo request
router
logic bomb
Assessment
35. The steps taken to gather evidence and information on the targets you wish to attack.
reconnaissance
ISO 17799
Written Authorization
reverse lookup; reverse DNS lookup
36. A document describing information security guidelines - policies - procedures - and standards.
Simple Mail Transfer Protocol (SMTP)
Challenge Handshake Authentication Protocol (CHAP)
Information Technology (IT) security architecture and framework
Macro virus
37. The means by which a recipient of a message can ensure the identity of the sender and that neither party can deny having sent or received the message. The most common method is through digital certificates.
Anonymizer
non-repudiation
heuristic scanning
Open System Interconnection (OSI) Reference Model
38. A cell phone attack in which the serial number from one cell phone is copied to another in an effort to copy the cell phone.
Tunneling Virus
Data Link layer
Cloning
Point-to-Point Protocol (PPP)
39. FTP Bounce Attack
-b
Annualized Loss Expectancy (ALE)
routed protocol
inference attack
40. An Internet Protocol Security (IPSec) header used to verify that the contents of a packet have not been modified while the packet was in transit.
Redundant Array of Independent Disks (RAID)
Authentication Header (AH)
stateful packet filtering
Antivirus (AV) software
41. A technology where you advertise one IP address externally and data packets are rerouted to the appropriate IP address inside your network by a device providing translation services. In this way - IP addresses of machines on your internal network are
Virus Hoax
Written Authorization
rogue access point
Network Address Translation (NAT)
42. Host-based IDS. An IDS that resides on the host - protecting against file and folder manipulation and other host-based attacks and actions.
Back orifice
EDGAR database
iris scanner
HIDS
43. Aggressive scan timing
parallel scan & 300 sec timeout & 1.25 sec/probe
Traceroute
phishing
Port Address Translation (PAT)
44. A software license agreement; a contract between the 'licensor' and purchaser establishing the right to use the software.
ad hoc mode
End User Licensing Agreement (EULA)
Collision
Pretty Good Privacy (PGP)
45. A systematic process for the assessment of security vulnerabilities.
stateful packet filtering
TACACS
INFOSEC Assessment Methodology (IAM)
-oN
46. A backlog of packets stored in buffers and waiting to be forwarded over an interface.
Zone transfer
queue
Rijndael
Client
47. A brand name of analog scrambling and de-scrambling equipment for cable and satellite television - invented primarily to keep consumer Television receive-only (TVRO) satellite equipment from receiving TV programming except on a subscription basis.
Asynchronous
spoofing
-sU
Videocipher II Satellite Encryption System
48. Actions - devices - procedures - techniques - or other measures intended to reduce the vulnerability of an information system.
port knocking
Countermeasures
Level III assessment
Hypertext Transfer Protocol Secure (HTTPS)
49. A value assigned to uniquely identify a single wide area network (WAN) in wireless LANs. SSIDs are broadcast by default - and are sent in the header of every packet. SSIDs provide no encryption or security.
encapsulation
Threat
protocol
Service Set Identifier (SSID)
50. A firewall evasion technique whereby packets are wrapped in HTTP - as a covert channel to the target.
HTTP tunneling
packet
Fraud and related activity in connection with computers
symmetric encryption