SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A utility that sends an ICMP Echo message to determine if a specific IP address is accessible; if the message receives a reply - the address is reachable.
R
Asynchronous
Unicode
Packet Internet Groper (ping)
2. Injecting traffic into the network to identify the operating system of a device.
Active Fingerprinting
Fraud and related activity in connection with computers
CIA triangle
script kiddie
3. The process of attaching a particular protocol header and trailer to a unit of data before transmission on the network. Occurs at layer 2 of the OSI reference model.
qualitative analysis
encapsulation
local area network (LAN)
protocol
4. A program designed to execute at a specific time to release malicious code onto the computer system or network.
routed protocol
Time Bomb
Domain Name System (DNS)
Address Resolution Protocol (ARP) table
5. A standard that provides best-practice recommendations on information security management for use by those responsible for initiating - implementing - or maintaining Information Security Management Systems (ISMS). Information security is defined with
signature scanning
Destination Unreachable
ISO 17799
Packet Internet Groper (ping)
6. A systematic process for the assessment of security vulnerabilities.
-PM
INFOSEC Assessment Methodology (IAM)
rule-based access control
Block Cipher
7. The ability to trace actions performed on a system to a specific user or system entity.
Access Point (AP)
Time To Live (TTL)
Accountability
Point-to-Point Tunneling Protocol (PPTP)
8. The rate at which a biometric system will incorrectly identify an unauthorized individual and allow them access (see false negative).
security kernel
-sA
False Acceptance Rate (FAR)
hardware keystroke logger
9. The process of a system providing a fully qualified domain name (FQDN) to a local name server - for resolution to its corresponding IP address.
Bit Flipping
Domain Name System (DNS) lookup
Baseline
Competitive Intelligence
10. A U.S. Department of Defense (DoD) standard that sets basic requirements for assessing the effectiveness of computer security controls built into a computer system.
Trusted Computer System Evaluation Criteria (TCSEC)
sheepdip
End User Licensing Agreement (EULA)
operating system attack
11. Chronological record of system activities to enable the reconstruction and examination of the sequence of events and changes in an event.
Filter
Audit Data
Electronic Code Book (ECB)
private network address
12. An environmentally conditioned workspace partially equipped with IT and telecommunications equipment to support relocated IT operations in the event of a significant disruption.
Telnet
social engineering
hashing algorithm
Warm Site
13. nmap all output
Multipartite virus
Database
-oA
Digital Watermarking
14. Describes practices in production and development that promote access to the end product's source materials.
open source
security bulletins
Zombie
Syslog
15. A security tool designed to protect a system or network against attacks by comparing traffic patterns against a list of both known attack signatures and general characteristics of how attacks may be carried out. Threats are rated and reported.
Trojan Horse
RxBoot
firewalking
intrusion detection system (IDS)
16. Provides router-to-router or host-to-network connections over asynchronous and synchronous circuits.
Point-to-Point Protocol (PPP)
-sR
Secure Sockets Layer (SSL)
Methodology
17. The process of embedding information into a digital signal in a way that makes it difficult to remove.
Man-in-the-middle attack
Virus Hoax
Digital Watermarking
Crossover Error Rate (CER)
18. A denial-of-service technique that uses numerous hosts to perform the attack.
Distributed DoS (DDoS)
Computer Emergency Response Team (CERT)
Data Encryption Standard (DES)
human-based social engineering
19. Calculations of two components of risk: R - the magnitude of the potential loss (L) - and the probability - p - that the loss will occur.
quantitative risk assessment
Transmission Control Protocol (TCP)
Filter
Information Technology (IT) asset criticality
20. A piece of software - provided by the vendor - intended to update or fix known - discovered problems in a computer program or its supporting data.
polymorphic virus
patch
-sT
asynchronous transmission
21. A VPN tunneling protocol with encryption. PPTP connects two nodes in a VPN by using one TCP port for negotiation and authentication and one IP protocol for data transfer.
No previous knowledge of the network
Internet Protocol (IP)
Simple Network Management Protocol (SNMP)
Point-to-Point Tunneling Protocol (PPTP)
22. A self-replicating - self-propagating - self-contained program that uses networking mechanisms to spread itself.
Zenmap
Internet Control Message Protocol (ICMP)
halo effect
Worm
23. The process of systematically testing each port on a firewall to map rules and determine accessible ports.
firewalking
phishing
segment
Password Authentication Protocol (PAP)
24. A computer file system architecture used in Windows - OS/2 - and most memory cards.
Kerberos
File Allocation Table (FAT)
social engineering
proxy server
25. 1. The path a packet travels to reach the intended destination. Each individual device along the path traveled is called a hop. 2. Information contained on a device containing instructions for reaching other nodes on the network. This information can
Malware
A procedure for identifying active hosts on a network.
route
-sV
26. Confidentiality - Integrity - and Availability are the three aspects of security and make up the triangle.
CIA triangle
stream cipher
HTTP
Wrapper
27. A protocol defining packets that are able to be routed by a router.
hot site
routed protocol
parallel scan & 75 sec timeout & 0.3 sec/probe
source routing
28. The process of transforming ciphertext into plaintext through the use of a cryptographic algorithm.
intranet
Decryption
Uniform Resource Locator (URL)
Internet Assigned Number Authority (IANA)
29. The use of deceptive computer-based means to trick individuals into disclosing sensitive personal information
Target Of Engagement (TOE)
Computer-Based Attack
network tap
phishing
30. An organization composed of engineers - scientists - and students who issue standards related to electrical - electronic - and computer engineering.
Fraud and related activity in connection with computers
--randomize_hosts -O OS fingerprinting
Trapdoor Function
Institute of Electrical and Electronics Engineers (IEEE)
31. A domain composed of all the systems sharing any given physical transport media. Systems within a collision domain may collide with each other during the transmission of data. Collisions can be managed by CSMA/CD (collision detection) or CSMA/CA (col
Domain Name System (DNS)
Application-Level Attacks
Annualized Loss Expectancy (ALE)
Collision Domain
32. A partially protected zone on a network - not exposed to the full fury of the Internet - but not fully behind the firewall. This technique is typically used on parts of the network that must remain open to the public (such as a web server) but must a
Demilitarized Zone (DMZ)
piggybacking
SID
Administratively Prohibited
33. A type of encryption where the same key is used to encrypt and decrypt the message.
NetBus
symmetric encryption
session splicing
network access server
34. The secret portion of an asymmetric key pair typically used to decrypt or digitally sign data. The private key is never shared and is always used for decryption - with one notable exception: The private key is used to encrypt the digital signature.
Demilitarized Zone (DMZ)
local area network (LAN)
Interior Gateway Protocol (IGP)
private key
35. A computer network confined to a relatively small area - such as a single building or campus.
Community String
local area network (LAN)
Telnet
Internal access to the network
36. An Ethernet networking system transmitting data at 100 million bits per second (Mbps) - 10 times the speed of an earlier Ethernet standard. Derived from the Ethernet 802.3 standard - it is also known as 100BaseT.
Fast Ethernet
overt channel
session hijacking
halo effect
37. Formerly Redundant Array of Inexpensive Disks; a technology that provides increased storage functions and reliability through redundancy. This is achieved by combining multiple disk drive components into a logical unit - where data is distributed acr
rogue access point
Tiger Team
port scanning
Redundant Array of Independent Disks (RAID)
38. Set of tools (applications or code) that enables administrator-level accessto a computer or computer network and is designed to obscure the fact that the system has been compromised. Rootkits are dangerous malware entities that provide administrator
Asynchronous
rootkit
MD5
heuristic scanning
39. Directing a protocol from one port to another.
Information Technology Security Evaluation Criteria (ITSEC)
Application Layer
-sO
port redirection
40. Originally an extension of PPP - this is a protocol for authentication used within wireless networks. Works with multiple authentication measures.
Accountability
Vulnerability Scanning
Extensible Authentication Protocol (EAP)
Three-Way (TCP) Handshake
41. A networking configuration where all nodes are connected in a circle with no terminated ends on the cable.
sidejacking
ring topology
Fiber Distributed Data Interface (FDDI)
serial scan & 300 sec wait
42. The monetary loss that can be expected for an asset due to risk over a one-year period. ALE is the product of the annual rate of occurrence (ARO) and the single loss expectancy (SLE). It is mathematically expressed as ALE = ARO
stateful packet filtering
No previous knowledge of the network
Institute of Electrical and Electronics Engineers (IEEE)
Annualized Loss Expectancy (ALE)
43. Layer 7 of the OSI reference model. The Application layer provides services to applications - which allow them access to the network. Protocols such as FTP and SMTP reside here.
Boot Sector Virus
scope creep
Application Layer
Cracker
44. A symmetric key cipher where plaintext bits are combined with a pseudo-random cipher bit stream (keystream) - typically by an exclusive-or (XOR) operation. In a stream cipher the plaintext digits are encrypted one at a time - and the transformation o
-sF
NetBus
stream cipher
gray hat
45. A group of experts that handles computer security incidents.
Asymmetric Algorithm
security incident response team (SIRT)
Serial Line Internet Protocol (SLIP)
security controls
46. LM Hash for short passwords (under 7)
404EE
Multipartite virus
Internet Protocol Security (IPSec) architecture
Internet Assigned Number Authority (IANA)
47. Used to find the domain name associated with an IP address; the opposite of a DNS lookup.
reverse lookup; reverse DNS lookup
self encrypting
Countermeasures
Routing Protocol
48. A method of network traffic filtering that monitors the entire communications process - including the originator of the session and from which direction it started.
CNAME record
stateful packet filtering
Biometrics
-sV
49. A person or entity indirectly involved in a relationship between two principles.
Multipurpose Internet Mail Extensions (MIME)
steganography
replay attack
Third Party
50. A device that receives and sends data packets between two or more networks; the packet headers and a forwarding table provide the router with the information necessary for deciding which interface to use to forward packets.
router
Time exceeded
risk assessment
parallel scan & 75 sec timeout & 0.3 sec/probe
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests