SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A NAT method in which multiple internal hosts - using private IP addressing - can be mapped through a single public IP address using the session IDs and port numbers. An internal global IP address can support in excess of 65 -000 concurrent TCP and U
FreeBSD
Backdoor
Port Address Translation (PAT)
port knocking
2. Polymorphic Virus
National Security Agency
self encrypting
protocol stack
SAM
3. The process of attaching a particular protocol header and trailer to a unit of data before transmission on the network. Occurs at layer 2 of the OSI reference model.
hot site
protocol
payload
encapsulation
4. Software or firmware intended to perform an unauthorized process that will have an adverse impact on the confidentiality - integrity - or availability of an information system. A virus - worm - Trojan horse - or other code-based entity that infects a
Backdoor
Post Office Protocol 3 (POP3)
personal identification number (PIN)
Malicious code
5. Normal scan timing
parallel scan
Challenge Handshake Authentication Protocol (CHAP)
S
stream cipher
6. A connection-oriented - layer 4 protocol for transporting data over network segments. TCP is considered reliable because it guarantees delivery and the proper reordering of transmitted packets. This protocol is used for most long-haul traffic on the
Virtual Private Network (VPN)
flood
overt channel
Transmission Control Protocol (TCP)
7. A set of rules defined by a system administrator that indicates whether access is allowed or denied to resource objects.
Crossover Error Rate (CER)
rule-based access control
Client
SOA record
8. When an authorized person allows (intentionally or unintentionally) someone to pass through a secure door - despite the fact that the intruder does not have a badge.
Anonymizer
gateway
piggybacking
Discretionary Access Control (DAC)
9. A method of permitting only MAC addresses in a preapproved list network access. Addresses not matching are blocked.
risk transference
MAC filtering
Secure Multipurpose Mail Extension (S/MIME)
suicide hacker
10. Activities to determine the extent to which a security control is implemented correctly - operating as intended - and producing the desired outcome with respect to meeting the security requirements for the system.
Mantrap
Assessment
reconnaissance
self encrypting
11. The monetary value assigned to an IT asset.
Level III assessment
Information Technology (IT) asset valuation
limitation of liability and remedies
steganography
12. Two or more LANs connected by a high-speed line across a large geographical area.
Virus Hoax
Filter
Wide Area Network (WAN)
Bluesnarfing
13. Ping Scan
risk acceptance
Level II assessment
-sP
A
14. A situation in which an IDS or other sensor triggers on an event as an intrusion attempt - when it was actually legitimate traffic.
War Dialing
Google hacking
Domain Name System (DNS) cache poisoning
false negative
15. The monetary value expected from the occurrence of a risk on an asset. It is mathematically expressed as single loss expectancy (SLE) = asset value (AV)
single loss expectancy (SLE)
secure channel
false negative
encapsulation
16. Formerly Redundant Array of Inexpensive Disks; a technology that provides increased storage functions and reliability through redundancy. This is achieved by combining multiple disk drive components into a logical unit - where data is distributed acr
POST
Redundant Array of Independent Disks (RAID)
A R
SID
17. A device providing temporary - on-demand - point-to-point network access to users.
network access server
router
Buffer
HIDS
18. A nonnumerical - subjective risk evaluation. Used with qualitative assessment (an evaluation of risk that results in ratings of none - low - medium - and high for the probability.)
risk transference
qualitative analysis
honeypot
routed protocol
19. Port 80/81/8080
payload
sidejacking
HTTP
initial sequence number (ISN)
20. A symmetric - block-cipher data-encryption standard that uses a variablelength key that can range from 32 bits to 448 bits.
Blowfish
Detective Controls
private network address
FreeBSD
21. An Ethernet networking system transmitting data at 100 million bits per second (Mbps) - 10 times the speed of an earlier Ethernet standard. Derived from the Ethernet 802.3 standard - it is also known as 100BaseT.
Fast Ethernet
iris scanner
-PB
-sA
22. ICMP Netmask
-sX
Telnet
-PM
signature scanning
23. A malicious computer program with self-replication capabilities that attaches to another file and moves with the host from one computer to another.
Virus
Application-Level Attacks
-sL
Cryptographic Key
24. A hacker who aims to bring down critical infrastructure for a 'cause' and does not worry about the penalties associated with his actions.
Hacks with permission
suicide hacker
physical security
network operations center (NOC)
25. A class of algorithms for cryptography that use the same cryptographic key for both decryption and encryption.
Corrective Controls
qualitative analysis
symmetric algorithm
Wide Area Network (WAN)
26. A program designed to browse websites in an automated - methodical manner. Sometimes these programs are used to harvest information from websites - such as e-mail addresses.
U P F
Level II assessment
Web Spider
Open System Interconnection (OSI) Reference Model
27. A social-engineering effort in which the attacker pretends to be an employee - a valid user - or even an executive to elicit information or access.
Active Fingerprinting
-PP
Authentication - Authorization - and Accounting (AAA)
impersonation
28. A standard developed to enable routers to exchange messages containing information about routes to reach subnets in the network.
port knocking
Routing Protocol
Active Fingerprinting
Internet Protocol (IP)
29. A network administration command-line tool available for many operating systems for querying the Domain Name System (DNS) to obtain domain name or IP address mappings or any other specific DNS record.
Minimum acceptable level of risk
nslookup
Presentation layer
identity theft
30. A string that represents the location of a web resource
HTTP tunneling
Simple Mail Transfer Protocol (SMTP)
Active Fingerprinting
Uniform Resource Locator (URL)
31. Also known as a digital certificate - this is an electronic file used to verify a user's identity - providing non-repudiation throughout the system It is also a set of data that uniquely identifies an entity. Certificates contain the entity's public
Certificate
null session
Finger
scope creep
32. The means by which a recipient of a message can ensure the identity of the sender and that neither party can deny having sent or received the message. The most common method is through digital certificates.
Buffer
Banner Grabbing
Wide Area Network (WAN)
non-repudiation
33. A U.S. Department of Defense (DoD) standard that sets basic requirements for assessing the effectiveness of computer security controls built into a computer system.
Telnet
Trusted Computer System Evaluation Criteria (TCSEC)
Defense in Depth
Authorization
34. The change or growth of a project's scope
Warm Site
scope creep
Authentication
Password Authentication Protocol (PAP)
35. The process of using an application to remotely identify open ports on a system (for example - whether systems allow connections through those ports).
Macro virus
port scanning
sidejacking
U P F
36. A protocol that allows a client computer to request services from a server and the server to return the results.
-P0
A R
-sT
remote procedure call (RPC)
37. Software or hardware components that restrict access between a protected network and the Internet - or between other sets of networks - to block unwanted use or attacks.
Digital Signature
encryption
firewall
Defines legal email marketing
38. Port 31337
Back orifice
Wrapper
Smurf attack
-sU
39. An Application layer protocol used primarily by Microsoft Windows to provide shared access to printers - files - and serial ports. It also provides an authenticated interprocess communication mechanism.
RPC-DCOM
Common Internet File System/Server Message Block
SNMP
qualitative analysis
40. The result of using a private key to encrypt a hash value for identification purposes within a PKI system. The signature can be decoded by the originator's public key - verifying his identity and providing non-repudiation. A valid digital signature g
risk transference
Point-to-Point Protocol (PPP)
Digital Signature
Wired Equivalent Privacy (WEP)
41. An attack where the hacker repeats a portion of a cryptographic exchange in hopes of fooling the system into setting up a communications channel.
replay attack
quantitative risk assessment
Application Layer
Hypertext Transfer Protocol Secure (HTTPS)
42. A method of password cracking whereby all possible options are systematically enumerated until a match is found. These attacks try every password (or authentication option) - one after another - until successful. Bruteforce attacks take a long time t
DNS enumeration
Active Attack
POP 3
Brute-Force Password Attack
43. Chronological record of system activities to enable the reconstruction and examination of the sequence of events and changes in an event.
Vulnerability
phishing
False Acceptance Rate (FAR)
Audit Data
44. A type of encryption where the same key is used to encrypt and decrypt the message.
symmetric encryption
limitation of liability and remedies
Destination Unreachable
Community String
45. Set of tools (applications or code) that enables administrator-level accessto a computer or computer network and is designed to obscure the fact that the system has been compromised. Rootkits are dangerous malware entities that provide administrator
Bastion host
Videocipher II Satellite Encryption System
rootkit
private network address
46. A set of related communications protocols operating together as a group to address communication at some or all of the seven layers of the OSI reference model.
Malware
protocol stack
Buffer
Cloning
47. A device that provides access between two or more networks. Gateways are typically used to connect dissimilar networks.
Domain Name System (DNS) lookup
gateway
-sS
queue
48. A distance-vector routing protocol that employs the hop count as a routing metric. The 'hold down time -' used to define how long a route is held in memory - is 180 seconds. RIP prevents routing loops by implementing a limit on the number of hops all
Trusted Computer Base (TCB)
phishing
Authentication - Authorization - and Accounting (AAA)
Routing Information Protocol (RIP)
49. A Canonical Name record within DNS - used to provide an alias for a domain name.
Zenmap
gap analysis
Network Basic Input/Output System (NetBIOS)
CNAME record
50. A protocol defining packets that are able to be routed by a router.
Tunneling Virus
Buffer
routed protocol
Tiger Team
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests