SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The act of dialing all numbers within an organization to discover open modems.
War Dialing
Back orifice
Syslog
Warm Site
2. An authentication method on point-to-point links - using a three-way handshake and a mutually agreed-upon key.
Network Basic Input/Output System (NetBIOS)
-sI
honeynet
Challenge Handshake Authentication Protocol (CHAP)
3. A function that is easy to compute in one direction - yet believed to be difficult to compute in the opposite direction (finding its inverse) without special information - called the 'trapdoor.' Widely used in cryptography.
steganography
Trapdoor Function
Mantrap
End User Licensing Agreement (EULA)
4. Aggressive scan timing
intrusion detection system (IDS)
limitation of liability and remedies
Wrapper
parallel scan & 300 sec timeout & 1.25 sec/probe
5. A connection-oriented - layer 4 protocol for transporting data over network segments. TCP is considered reliable because it guarantees delivery and the proper reordering of transmitted packets. This protocol is used for most long-haul traffic on the
operating system attack
Transmission Control Protocol (TCP)
404EE
Ethical Hacker
6. Port 161/162
Active Attack
SNMP
Hacks without permission
operating system attack
7. An Internet routing protocol used to exchange routing information within an autonomous system.
ring topology
Interior Gateway Protocol (IGP)
Client
Local Administrator
8. UDP Scan
Backdoor
-sU
SNMP
Zombie
9. A string used for authentication in SNMP. The public community string is used for read-only searches - whereas the private community string is used for read/write. Community strings are transmitted in clear text in SNMPv1. SNMPv3 provides encryption
flood
Community String
Methodology
Fast Ethernet
10. An attack technique that tricks your DNS server into believing it has received authentic information when - in reality - it has been provided fraudulent data. DNS cache poisoning affects user traffic by sending it to erroneous or malicious end points
network interface card (NIC)
parallel scan
-sA
Domain Name System (DNS) cache poisoning
11. Nmap ml output
network access server
-oX
Uniform Resource Locator (URL)
Zombie
12. Provides router-to-router or host-to-network connections over asynchronous and synchronous circuits.
Minimum acceptable level of risk
heuristic scanning
Point-to-Point Protocol (PPP)
security breach or security incident
13. Software that has advertisements embedded within. Generally displays ads in the form of pop-ups.
halo effect
role-based access control
Event
Adware
14. An international encoding standard - working within multiple languages and scripts - that represents each letter - digit - or symbol with a unique numeric value that applies across different platforms.
Unicode
Wireless Local Area Network (WLAN)
Redundant Array of Independent Disks (RAID)
port knocking
15. Used to find the domain name associated with an IP address; the opposite of a DNS lookup.
Block Cipher
reverse lookup; reverse DNS lookup
sidejacking
FreeBSD
16. A program or piece of code inserted into a system - usually covertly - with the intent of compromising the confidentiality - integrity - or availability of the victim's data - applications - or operating system. Malware consists of viruses - worms -
Malware
gray box testing
Black Hat
remote procedure call (RPC)
17. A well-known and studied phenomenon of human nature - whereby a single trait influences the perception of other traits.
halo effect
Cryptographic Key
Archive
flood
18. A partially protected zone on a network - not exposed to the full fury of the Internet - but not fully behind the firewall. This technique is typically used on parts of the network that must remain open to the public (such as a web server) but must a
spoofing
Tunneling Virus
Zenmap
Demilitarized Zone (DMZ)
19. A method of network traffic filtering that monitors the entire communications process - including the originator of the session and from which direction it started.
Mantrap
Asset
FreeBSD
stateful packet filtering
20. An evaluation consisting of a document review - interviews - and demonstrations - as well as vulnerability scans and hands-on testing.
Certificate Authority (CA)
Level II assessment
GET
Corrective Controls
21. A device or service designed to obfuscate traffic between a client and the Internet. Generally used to make activity on the Internet as untraceable as possible.
Digital Watermarking
Cache
Anonymizer
Wrapper
22. In computer security - this is an algorithm that uses separate keys for encryption and decryption.
Methodology
Syslog
Asymmetric Algorithm
Due Diligence
23. Evaluation in which testers attempt to penetrate the network.
social engineering
Level III assessment
hashing algorithm
Asset
24. A symmetric - block-cipher data-encryption standard that uses a variablelength key that can range from 32 bits to 448 bits.
Black Box Testing
Blowfish
Due Diligence
asynchronous transmission
25. An approach to restricting system access to authorized users in which roles are created for various job functions. The permissions to perform certain operations are assigned to specific roles. Members of staff (or other system users) are assigned par
payload
role-based access control
queue
Time To Live (TTL)
26. Malicious code that uses a polymorphic engine to mutate while keeping the original algorithm intact; the code changes itself each time it runs - but the function of the code will not change.
Time exceeded
scope creep
Media Access Control (MAC)
polymorphic virus
27. Normal scan timing
parallel scan
Point-to-Point Protocol (PPP)
Overwhelm CAM table to convert switch to hub mode
Buffer
28. A device that receives and sends data packets between two or more networks; the packet headers and a forwarding table provide the router with the information necessary for deciding which interface to use to forward packets.
router
human-based social engineering
Due Diligence
Wired Equivalent Privacy (WEP)
29. A protocol used for sending and receiving log information for nodes on a network.
-PP
Asset
parallel scan & 300 sec timeout & 1.25 sec/probe
Syslog
30. A protocol defining packets that are able to be routed by a router.
404EE
Rijndael
routed protocol
Anonymizer
31. An attack that is direct in nature - usually where the attacker injects something into - or otherwise alters - the network or system target.
integrity
Active Attack
private network address
Discretionary Access Control (DAC)
32. A document describing information security guidelines - policies - procedures - and standards.
identity theft
Information Technology (IT) security architecture and framework
Vulnerability Management
Wired Equivalent Privacy (WEP)
33. An extensible mechanism for e-mail. A variety of MIME types exist for sending content such as audio - binary - or video using the Simple Mail Transfer Protocol (SMTP).
Transport Layer Security (TLS)
Multipurpose Internet Mail Extensions (MIME)
Annualized Loss Expectancy (ALE)
remote procedure call (RPC)
34. Microsoft SID 500
End User Licensing Agreement (EULA)
Trusted Computer Base (TCB)
Local Administrator
hardware keystroke logger
35. Hex 04
Authorization
R
signature scanning
Internet Control Message Protocol (ICMP)
36. Terminal Access Controller Access-Control System. A remote authentication protocol that is used to communicate with an authentication server commonly used in Unix networks.
Whois
TACACS
security by obscurity
-sX
37. 1. The path a packet travels to reach the intended destination. Each individual device along the path traveled is called a hop. 2. Information contained on a device containing instructions for reaching other nodes on the network. This information can
Telnet
null session
Competitive Intelligence
route
38. A communications protocol used for browsing the Internet.
FTP
404EE
parameter tampering
Hypertext Transfer Protocol (HTTP)
39. Hashing algorithm that results in a 128-bit output.
non-repudiation
MD5
Tunnel
Denial of Service (DoS)
40. A limit on the amount of time or number of iterations or transmissions in computer and network technology a packet can experience before it will be discarded.
network operations center (NOC)
Fast Ethernet
Time To Live (TTL)
Real application encompassing Trojan
41. A set of related communications protocols operating together as a group to address communication at some or all of the seven layers of the OSI reference model.
SYN flood attack
protocol stack
Secure Multipurpose Mail Extension (S/MIME)
Time To Live (TTL)
42. Polite scan timing
-PM
Extensible Authentication Protocol (EAP)
serialize scans & 0.4 sec wait
signature scanning
43. In a classful IPv4 subnet - this is the network number with all binary 0s in the subnet part of the number. When written in decimal - the zero subnet has the same number as the classful network number.
forwarding
Zero Subnet
qualitative analysis
A procedure for identifying active hosts on a network.
44. Any network incident that prompts some kind of log entry or other notification.
Open System Interconnection (OSI) Reference Model
Trojan Horse
Event
Zenmap
45. Security identifier. The method by which Windows identifies user - group - and computer accounts for rights and permissions.
SID
Brute-Force Password Attack
Overwhelm CAM table to convert switch to hub mode
MD5
46. Provides data encryption for IEEE 802.11 wireless networks so data can only be decrypted by the intended recipients.
ping sweep
Internet Protocol (IP)
Wi-Fi Protected Access (WPA)
Virtual Local Area Network (VLAN)
47. IP Protocol Scan
security defect
packet filtering
Anonymizer
-sO
48. In penetration testing - this is a method of testing the security of a system or subnet without any previous knowledge of the device or network. Designed to simulate an attack by an outside intruder (usually from the Internet).
-sW
Multipurpose Internet Mail Extensions (MIME)
Rijndael
Black Box Testing
49. A Unix-like computer operating system descending from the BSD. Open-BSD includes a number of security features absent or optional in other operating systems.
rootkit
Secure Sockets Layer (SSL)
Authorization
OpenBSD
50. A distance-vector routing protocol that employs the hop count as a routing metric. The 'hold down time -' used to define how long a route is held in memory - is 180 seconds. RIP prevents routing loops by implementing a limit on the number of hops all
secure channel
Authorization
Videocipher II Satellite Encryption System
Routing Information Protocol (RIP)