SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Start of Authority record. This record identifies the primary name server for the zone. The SOA record contains the host name of the server responsible for all DNS records within the namespace - as well as the basic properties of the domain.
Hacks with permission
replay attack
SOA record
security breach or security incident
2. A standard developed to enable routers to exchange messages containing information about routes to reach subnets in the network.
-PT
Routing Protocol
Competitive Intelligence
Cloning
3. A social-engineering attack that manipulates the victim into calling the attacker for help.
Tiger Team
GET
reverse social engineering
ring topology
4. NSA
parallel scan & 300 sec timeout & 1.25 sec/probe
Finding a directory listing and gaining access to a parent or root file for access to other files
National Security Agency
Echo Reply
5. An Internet Protocol Security (IPSec) header used to verify that the contents of a packet have not been modified while the packet was in transit.
Trusted Computer System Evaluation Criteria (TCSEC)
Authentication Header (AH)
LDAP
Certificate Authority (CA)
6. Transmission using channels or frequencies outside those normally used for data transfer; often used for error reporting.
-sF
encapsulation
out-of-band signaling
Multipurpose Internet Mail Extensions (MIME)
7. nmap
suicide hacker
-p <port ranges>
Cookie
network operations center (NOC)
8. Steps taken to identify and limit risks to an acceptable or reasonable level of exposure.
Domain Name System (DNS)
Due Diligence
Tunnel
Overwhelm CAM table to convert switch to hub mode
9. The default network authentication suite of protocols for Windows NT 4.0
NT LAN Manager (NTLM)
proxy server
security breach or security incident
SSH
10. A domain composed of all the systems sharing any given physical transport media. Systems within a collision domain may collide with each other during the transmission of data. Collisions can be managed by CSMA/CD (collision detection) or CSMA/CA (col
Wireless Local Area Network (WLAN)
serialize scans & 15 sec wait
Media Access Control (MAC)
Collision Domain
11. Layer 6 of the OSI reference model. The Presentation layer ensures information sent by the Application layer of the sending system will be readable by the Application layer of the receiving system.
Annualized Loss Expectancy (ALE)
Uniform Resource Locator (URL)
Presentation layer
Internet Protocol Security (IPSec) architecture
12. White box test
Wiretapping
Internal access to the network
Zombie
-sT
13. An application that monitors a computer or network to identify - and prevent - malware. AV is usually signature-based - and can take multiple actions on defined malware files/activity.
security defect
Antivirus (AV) software
identity theft
NOP
14. Safeguards or countermeasures to avoid - counteract - or minimize security risks.
security controls
risk avoidance
suicide hacker
Exploit
15. A security protocol for wireless local area networks defined in the 802.11b standard; intended to provide the same level of security as a wired LAN. WEP is not considered strong security - although it does authenticate clients to access points - encr
Electronic Code Book (ECB)
Virus
Wired Equivalent Privacy (WEP)
ISO 17799
16. A utility that traces a packet from your computer to an Internet host - showing how many hops the packet takes to reach the host and how long the packet requires to complete the hop.
Electronic Code Book (ECB)
Time To Live (TTL)
ring topology
Traceroute
17. A pen testing method where the attacker knows all information about the internal network. It is designed to simulate an attack by a disgruntled systems administrator - or similar level.
Distributed DoS (DDoS)
White Box Testing
Archive
risk avoidance
18. A card with a built-in microprocessor and memory used for identification or financial transactions. The card transfers data to and from a central computer when inserted into a reader.
parallel scan & 75 sec timeout & 0.3 sec/probe
smart card
Discretionary Access Control (DAC)
fragmentation
19. The organization that governs the Internet's top-level domains - IP address allocation - and port number assignments.
FreeBSD
Internet Assigned Number Authority (IANA)
Replacing numbers in a url to access other files
security defect
20. An electronic version of junk mail. Unsolicited commercial e-mail sent to numerous recipients.
Cloning
War Chalking
Active Fingerprinting
spam
21. Policy stating what users of a system can and cannot do with the organization's assets.
Temporal Key Integrity Protocol (TKIP)
CIA triangle
Acceptable Use Policy (AUP)
Wired Equivalent Privacy (WEP)
22. The central part of a computer or communications system hardware firmware - and software that implements the basic security procedures for controlling access to system resources.
HTTP tunneling
Filter
security kernel
private key
23. A type of encryption where the same key is used to encrypt and decrypt the message.
Vulnerability Assessment
Audit Trail
DNS enumeration
symmetric encryption
24. Software used to bind a Trojan and a legitimate program together so the Trojan will be installed when the legitimate program is executed.
protocol stack
Tini
Domain Name System (DNS) cache poisoning
Wrapper
25. A value used to control cryptographic operations - such as decryption -encryption - signature generation - and signature verification.
Cryptographic Key
Level II assessment
hash
Vulnerability Scanning
26. An e-mail protection method using a secret message or image that can be referenced on any official communication with the site; if an e-mail is received without the image or message - the recipient knows it is not legitimate.
Reconnaissance - Scanning - Gaining Access - Maintaining Access - Covering Tracks
Sign in Seal
Application Layer
network interface card (NIC)
27. A type of attack used to deny service to legitimate users of a network resource by intentionally overloading the network with illegitimate TCP connection requests. SYN packets are sent repeatedly to the target - but the corresponding SYN/ACK response
SYN flood attack
Competitive Intelligence
Internet Control Message Protocol (ICMP)
-P0
28. A simple PPP authentication mechanism in which the user name and password are transmitted in clear text to prove identity. PAP compares the user name and password to a table listing authorized users.
Password Authentication Protocol (PAP)
Lightweight Directory Access Protocol (LDAP)
Defines legal email marketing
-sX
29. A cell phone attack in which the serial number from one cell phone is copied to another in an effort to copy the cell phone.
Vulnerability Assessment
End User Licensing Agreement (EULA)
Cloning
SYN flood attack
30. A method for detecting malicious code on a computer where the files are compared to signatures of known viruses stored in a database.
quality of service (QoS)
nslookup
Cryptography
signature scanning
31. In a classful IPv4 subnet - this is the network number with all binary 0s in the subnet part of the number. When written in decimal - the zero subnet has the same number as the classful network number.
Domain Name System (DNS)
heuristic scanning
Zero Subnet
Challenge Handshake Authentication Protocol (CHAP)
32. Method used by antivirus software to detect new - unknown viruses that have not yet been identified; based on a piece-by-piece examination of a program - looking for a sequence or sequences of instructions that differentiate the virus from 'normal' p
-sL
Client
heuristic scanning
SYN attack
33. An attack against an authentication protocol in which the attacker intercepts data in transit along the network between the claimant and verifier - but does not alter the data (in other words - eavesdropping).
-P0
passive attack
Antivirus (AV) software
SNMP
34. A symmetric key cipher where plaintext bits are combined with a pseudo-random cipher bit stream (keystream) - typically by an exclusive-or (XOR) operation. In a stream cipher the plaintext digits are encrypted one at a time - and the transformation o
Virus Hoax
stream cipher
encryption
shoulder surfing
35. A comparison metric for different biometric devices and technologies; the point at which the false acceptance rate (FAR) equals the
parallel scan & 75 sec timeout & 0.3 sec/probe
Crossover Error Rate (CER)
smart card
identity theft
36. A cryptographic attack where bits are manipulated in the ciphertext itself to generate a predictable outcome in the plaintext once it is decrypted.
Bluesnarfing
patch
signature scanning
Bit Flipping
37. An Application layer protocol used primarily by Microsoft Windows to provide shared access to printers - files - and serial ports. It also provides an authenticated interprocess communication mechanism.
Minimum acceptable level of risk
Common Internet File System/Server Message Block
NetBus
key exchange protocol
38. A host designed to collect data on suspicious activity.
honeypot
Cookie
Hacks with permission
John the Ripper - LOphtcrack - Ophtcrack - Cain and Abel
39. RPC Scan
Wired Equivalent Privacy (WEP)
Authentication - Authorization - and Accounting (AAA)
-sR
patch
40. The transmission of digital signals without precise clocking or synchronization.
asynchronous transmission
Malware
Trusted Computer Base (TCB)
Daemon
41. A method of password cracking whereby all possible options are systematically enumerated until a match is found. These attacks try every password (or authentication option) - one after another - until successful. Bruteforce attacks take a long time t
hybrid attack
polymorphic virus
Cookie
Brute-Force Password Attack
42. A communications protocol used for browsing the Internet.
Hypertext Transfer Protocol (HTTP)
Minimum acceptable level of risk
stateful packet filtering
quantitative risk assessment
43. The process of systematically testing each port on a firewall to map rules and determine accessible ports.
security kernel
parallel scan
-oN
firewalking
44. List Scan
POP 3
-b
-sL
SYN attack
45. A means of exchanging information from one entity to another using a process that does not provide an attacker the opportunity to reorder - delete - insert - or read information.
CAM table
secure channel
Web Spider
Level III assessment
46. An approach to restricting system access to authorized users in which roles are created for various job functions. The permissions to perform certain operations are assigned to specific roles. Members of staff (or other system users) are assigned par
Zone transfer
Address Resolution Protocol (ARP) table
SMB
role-based access control
47. A piece of software - provided by the vendor - intended to update or fix known - discovered problems in a computer program or its supporting data.
patch
Internet Control Message Protocol (ICMP)
Possession of access devices
War Chalking
48. A non-self-replicating program that appears to have a useful purpose - but in reality has a different - malicious purpose.
Corrective Controls
open source
Trojan Horse
White Box Testing
49. An attack where the hacker manipulates parameters within the URL string in hopes of modifying data.
DNS enumeration
Collision
parameter tampering
Information Technology (IT) infrastructure
50. An Application layer protocol for sending electronic mail between servers.
Simple Mail Transfer Protocol (SMTP)
Last In First Out (LIFO)
risk transference
infrastructure mode