SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. An attack with the goal of preventing authorized users from accessing services and preventing the normal operation of computers and networks.
nslookup
Denial of Service (DoS)
hybrid attack
sheepdip
2. A system used by the Securities and Exchange Commission (SEC) for companies and businesses to transmit required filings and information. The EDGAR database performs automated collection - validation - indexing - acceptance - and forwarding of submiss
Electronic Code Book (ECB)
End User Licensing Agreement (EULA)
EDGAR database
Defense in Depth
3. An Application layer protocol for sending electronic mail between servers.
encapsulation
Media Access Control (MAC)
Simple Mail Transfer Protocol (SMTP)
Daisy Chaining
4. A limited-function version of the Internetworking Operating System (IOS) - held in read-only memory in some earlier models of Cisco devices - capable of performing several seldom-needed low-level functions such as loading a new IOS into Flash memory
Vulnerability
Zombie
Hacks without permission
RxBoot
5. The lack of clocking (imposed time ordering) on a bit stream.
-b
Domain Name System (DNS) cache poisoning
Asynchronous
Simple Mail Transfer Protocol (SMTP)
6. Also known as the dot-dot-slash attack. Using directory traversal - the attacker attempts to access restricted directories and execute commands outside intended web server directories by using the URL to redirect to an unintended folder location.
Vulnerability Management
service level agreements (SLAs)
Asymmetric
Directory Traversal
7. Freely and readily available information on an organization that can be gathered by a business entity about its competitor's customers - products - and marketing - and can be used by an attacker to build useful information for further attacks.
Kerberos
port knocking
Competitive Intelligence
SYN flood attack
8. A domain composed of all the systems sharing any given physical transport media. Systems within a collision domain may collide with each other during the transmission of data. Collisions can be managed by CSMA/CD (collision detection) or CSMA/CA (col
Collision Domain
remote procedure call (RPC)
heuristic scanning
Vulnerability
9. Wireless LAN standards created by IEEE. 802.11a runs at up to 54Mbps at 5GHz - 802.11b runs at 11Mbps at 2.4GHz - 802.11g runs at 54Mbps at 2.4GHz - and 802.11n can run upwards of 150MBps.
reverse lookup; reverse DNS lookup
802.11
Domain Name System (DNS) lookup
Replacing numbers in a url to access other files
10. The ability to trace actions performed on a system to a specific user or system entity.
hash
FreeBSD
-sO
Accountability
11. A partially protected zone on a network - not exposed to the full fury of the Internet - but not fully behind the firewall. This technique is typically used on parts of the network that must remain open to the public (such as a web server) but must a
Demilitarized Zone (DMZ)
Warm Site
Uniform Resource Locator (URL)
gray box testing
12. Set of tools (applications or code) that enables administrator-level accessto a computer or computer network and is designed to obscure the fact that the system has been compromised. Rootkits are dangerous malware entities that provide administrator
Sign in Seal
rootkit
replay attack
remote procedure call (RPC)
13. Activities to determine the extent to which a security control is implemented correctly - operating as intended - and producing the desired outcome with respect to meeting the security requirements for the system.
Antivirus (AV) software
intrusion prevention system (IPS)
HTTP
Assessment
14. Confidentiality - Integrity - and Availability are the three aspects of security and make up the triangle.
Wireless Local Area Network (WLAN)
Bluejacking
A
CIA triangle
15. A skilled hacker that straddles the line between white hat (hacking only with permission and within guidelines) and black hat (malicious hacking for personal gain). Gray hats sometime perform illegal acts to exploit technology with the intent of achi
Lightweight Directory Access Protocol (LDAP)
gray hat
Defines legal email marketing
Interior Gateway Protocol (IGP)
16. An information assurance strategy in which multiple layers of defense are placed throughout an Information Technology system.
Defense in Depth
audit
Cloning
Extensible Authentication Protocol (EAP)
17. Content Addressable Memory table. Holds all the MAC-address-to-port mappings on a switch.
CAM table
Wrapper
INFOSEC Assessment Methodology (IAM)
Tiger Team
18. A wireless LAN security standard developed by IEEE. Requires Temporal Key Integrity Protocol (TKIP) and Advanced Encryption Standard (AES).
source routing
Multipartite virus
smart card
802.11 i
19. ICMP Type/Code 3-13
Bluetooth
remote procedure call (RPC)
ISO 17799
Administratively Prohibited
20. The cyclical practice of identifying - classifying - remediating - and mitigating vulnerabilities.
hybrid attack
Information Technology (IT) infrastructure
segment
Vulnerability Management
21. A standard developed to enable routers to exchange messages containing information about routes to reach subnets in the network.
Routing Protocol
private key
remote procedure call (RPC)
net use \[target ip]IPC$ '' /user:''
22. The monetary loss that can be expected for an asset due to risk over a one-year period. ALE is the product of the annual rate of occurrence (ARO) and the single loss expectancy (SLE). It is mathematically expressed as ALE = ARO
Data Encryption Standard (DES)
Annualized Loss Expectancy (ALE)
qualitative analysis
Ciphertext
23. The transmission of digital signals without precise clocking or synchronization.
private network address
Event
asynchronous transmission
Point-to-Point Protocol (PPP)
24. A computer network confined to a relatively small area - such as a single building or campus.
sheepdip
local area network (LAN)
-oX
gateway
25. A routing protocol developed to be used within a single organization.
Interior Gateway Protocol (IGP)
Time exceeded
Information Technology (IT) infrastructure
NetBSD
26. A software license agreement; a contract between the 'licensor' and purchaser establishing the right to use the software.
End User Licensing Agreement (EULA)
Asset
Point-to-Point Protocol (PPP)
MD5
27. Nmap normal output
Authentication - Authorization - and Accounting (AAA)
-oN
Collision Domain
Kerberos
28. A decision to reduce the potential for damage to or loss of an IT asset by taking some type of action
gray box testing
risk avoidance
Computer-Based Attack
Internet Protocol (IP)
29. The process of transforming ciphertext into plaintext through the use of a cryptographic algorithm.
A S
Trapdoor Function
Collision Domain
Decryption
30. don't ping
Bluetooth
Covert Channel
Filter
-P0
31. A string used for authentication in SNMP. The public community string is used for read-only searches - whereas the private community string is used for read/write. Community strings are transmitted in clear text in SNMPv1. SNMPv3 provides encryption
role-based access control
Community String
Buffer Overflow
-oG
32. Hex 14
Wiretapping
Last In First Out (LIFO)
separation of duties
A R
33. The basis of this kind of security is that an individual user - or program operating on the user's behalf - is allowed to specify explicitly the types of access other users (or programs executing on their behalf) may have to information under the use
Discretionary Access Control (DAC)
spoofing
Auditing
RID Resource identifier
34. A computer system that performs tasks dictated by an attacker from a remote location. Zombies may be active or idle - and owners of the systems generally do not know their systems are compromised.
HTTP tunneling
Level II assessment
Zombie
Fiber Distributed Data Interface (FDDI)
35. A group of experts that handles computer security incidents.
Access Control List (ACL)
security incident response team (SIRT)
Wired Equivalent Privacy (WEP)
Network Address Translation (NAT)
36. A one-way mathematical function that generates a fixedlength numerical string (hash) from a given data input. MD5 and SHA-1 are hashing algorithms.
Bit Flipping
-sL
Time To Live (TTL)
hashing algorithm
37. Xmas Tree scan
FreeBSD
Acknowledgment (ACK)
-sX
Common Internet File System/Server Message Block
38. A suite of protocols used for securing Internet Protocol (IP) communications by authenticating and encrypting each IP packet of a communication session. This suite includes protocols for establishing mutual authentication between agents at the sessio
non-repudiation
Internet Protocol Security (IPSec) architecture
Wi-Fi
risk assessment
39. The process of determining if a network entity (user or service) is legitimate
Authentication
local area network (LAN)
File Transfer Protocol (FTP)
Defines legal email marketing
40. Formerly Redundant Array of Inexpensive Disks; a technology that provides increased storage functions and reliability through redundancy. This is achieved by combining multiple disk drive components into a logical unit - where data is distributed acr
Redundant Array of Independent Disks (RAID)
piggybacking
port knocking
iris scanner
41. A firewall evasion technique whereby packets are wrapped in HTTP - as a covert channel to the target.
-sX
-p <port ranges>
HTTP tunneling
RxBoot
42. An attack in which the hacker can derive information from the ciphertext without actually decoding it. Sensitive information can be considered compromised if an adversary can infer its real value with a high level of confidence.
inference attack
port knocking
impersonation
human-based social engineering
43. Black hat
Unicode
Finger
Hacks without permission
router
44. The process of using easily accessible DNS records to map a target network's internal hosts.
DNS enumeration
NT LAN Manager (NTLM)
Client
Multipurpose Internet Mail Extensions (MIME)
45. A technology that establishes a tunnel to create a private - dedicated - leased-line network over the Internet. The data is encrypted so it's readable only by the sender and receiver. Companies commonly use VPNs to allow employees to connect securely
Information Technology (IT) asset criticality
Bluejacking
Virtual Private Network (VPN)
Brute-Force Password Attack
46. The act of secretly listening to the private conversations of others without their consent. This can also be done over telephone lines (wiretapping) - e-mail - instant messaging - and other methods of communication considered private
Trusted Computer System Evaluation Criteria (TCSEC)
RID Resource identifier
Syslog
Eavesdropping
47. A cryptographic attack where bits are manipulated in the ciphertext itself to generate a predictable outcome in the plaintext once it is decrypted.
-sL
security defect
Multipartite virus
Bit Flipping
48. The public portion of an asymmetric key pair typically used to encrypt data or verify signatures. Public keys are shared and are used to encrypt messages.
polymorphic virus
public key
port scanning
ISO 17799
49. A principle in security engineering that attempts to use anonymity and secrecy (of design - implementation - and so on) to provide security; the footprint of the organization - entity - network - or system is kept as small as possible to avoid intere
serialize scans & 0.4 sec wait
protocol
security by obscurity
Finger
50. Software code - a portion of data - or sequence of commands intended to take advantage of a bug or vulnerability in order to cause unintended or unanticipated behavior to occur on computer software or hardware.
Community String
phishing
Blowfish
Exploit
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests