SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A network traffic management technique designed to allow applications to specify the route a packet will take to a destination - regardless of what the route tables between the two systems say.
Antivirus (AV) software
single loss expectancy (SLE)
Cloning
source routing
2. SYN Ping
inference attack
iris scanner
-PS
Presentation layer
3. A stand-alone computer - kept off the network - that is used for scanning potentially malicious media or software.
Trusted Computer Base (TCB)
EDGAR database
impersonation
sheepdip
4. The act of using numerous electronic serial numbers on a cell phone until a valid number is located.
Macro virus
Tumbling
public key infrastructure (PKI)
security incident response team (SIRT)
5. A self-replicating - self-propagating - self-contained program that uses networking mechanisms to spread itself.
Worm
network operations center (NOC)
Countermeasures
Address Resolution Protocol (ARP) table
6. An application that monitors a computer or network to identify - and prevent - malware. AV is usually signature-based - and can take multiple actions on defined malware files/activity.
Antivirus (AV) software
single loss expectancy (SLE)
parameter tampering
-PT
7. An Internet Protocol Security (IPSec) header used to verify that the contents of a packet have not been modified while the packet was in transit.
Wide Area Network (WAN)
port knocking
Multipurpose Internet Mail Extensions (MIME)
Authentication Header (AH)
8. Hashing algorithm that results in a 128-bit output.
Reconnaissance - Scanning - Gaining Access - Maintaining Access - Covering Tracks
MD5
Time To Live (TTL)
Tunneling
9. A three-step process computers execute to negotiate a connection with one another. The three steps are SYN - SYN/ACK - ACK.
CNAME record
Authentication
Audit Data
Three-Way (TCP) Handshake
10. A wireless access point that has either been installed on a secure company network without explicit authorization from a local network administrator - or has been created to allow a hacker to conduct a man-in-the-middle attack.
Active Attack
-oG
rogue access point
hot site
11. A suite of protocols used for securing Internet Protocol (IP) communications by authenticating and encrypting each IP packet of a communication session. This suite includes protocols for establishing mutual authentication between agents at the sessio
Unicode
remote access
Traceroute
Internet Protocol Security (IPSec) architecture
12. A skilled hacker that straddles the line between white hat (hacking only with permission and within guidelines) and black hat (malicious hacking for personal gain). Gray hats sometime perform illegal acts to exploit technology with the intent of achi
logic bomb
War Chalking
net use \[target ip]IPC$ '' /user:''
gray hat
13. Formerly Redundant Array of Inexpensive Disks; a technology that provides increased storage functions and reliability through redundancy. This is achieved by combining multiple disk drive components into a logical unit - where data is distributed acr
phishing
Blowfish
Redundant Array of Independent Disks (RAID)
Vulnerability
14. Computer software or hardware that can intercept and log traffic passing over a digital network.
hashing algorithm
Asymmetric Algorithm
operating system attack
sniffer
15. A method of permitting only MAC addresses in a preapproved list network access. Addresses not matching are blocked.
MAC filtering
Audit Trail
integrity
impersonation
16. A network administration command-line tool available for many operating systems for querying the Domain Name System (DNS) to obtain domain name or IP address mappings or any other specific DNS record.
nslookup
session splicing
security controls
-PS
17. Any kind of connection that allows you to see all traffic passing by. Generally used in reference to a NIDS (network-based IDS) to monitor all traffic.
network tap
-PM
Fraud and related activity in connection with computers
Bastion host
18. A communications channel that is being used for a purpose it was not intended for - usually to transfer information secretly.
Administratively Prohibited
SOA record
Covert Channel
promiscuous mode
19. A principle in security engineering that attempts to use anonymity and secrecy (of design - implementation - and so on) to provide security; the footprint of the organization - entity - network - or system is kept as small as possible to avoid intere
Virtual Private Network (VPN)
INFOSEC Assessment Methodology (IAM)
Redundant Array of Independent Disks (RAID)
security by obscurity
20. A simple PPP authentication mechanism in which the user name and password are transmitted in clear text to prove identity. PAP compares the user name and password to a table listing authorized users.
Password Authentication Protocol (PAP)
Wide Area Network (WAN)
open source
signature scanning
21. The result of using a private key to encrypt a hash value for identification purposes within a PKI system. The signature can be decoded by the originator's public key - verifying his identity and providing non-repudiation. A valid digital signature g
Digital Signature
Transmission Control Protocol (TCP)
spam
flood
22. Safeguards or countermeasures to avoid - counteract - or minimize security risks.
Internet Control Message Protocol (ICMP)
User Datagram Protocol (UDP)
HIDS
security controls
23. A nontechnical method of hacking. Social engineering is the art of manipulating people - whether in person (human-based) or via computing methods (computer-based) - into providing sensitive information.
Point-to-Point Tunneling Protocol (PPTP)
social engineering
Vulnerability Scanning
ring topology
24. A type of malware that covertly collects information about a user.
MD5
spyware
Hacks with permission
Certificate
25. A cyber attacker who acts without permission from - and gives prior notice to - the resource owner. Also known as a malicious hacker.
payload
non-repudiation
false negative
Cracker
26. The change or growth of a project's scope
ISO 17799
Access Creep
scope creep
security defect
27. Management policy and procedures designed to maintain or restore business operations - including computer operations - possibly at an alternate location - in the event of emergencies - system failures - or disaster.
Availability
key exchange protocol
Contingency Plan
A S
28. Physical socket provided on routers and switches for cable connections between a computer and the router/switch. This connection enables the computer to configure - query - and troubleshoot the router/switch by use of a terminal emulator and a comman
sniffer
Console Port
Minimum acceptable level of risk
Wired Equivalent Privacy (WEP)
29. Black box test
fully qualified domain name (FQDN)
No previous knowledge of the network
Routing Information Protocol (RIP)
encryption
30. A software or hardware defect that often results in system vulnerabilities.
Bug
-PB
Backdoor
quality of service (QoS)
31. A software or hardware application or device that captures user keystrokes.
keylogger
impersonation
Collision Domain
-PT
32. The means by which a recipient of a message can ensure the identity of the sender and that neither party can deny having sent or received the message. The most common method is through digital certificates.
non-repudiation
Wide Area Network (WAN)
-PP
-PS
33. A sublayer of layer 2 of the OSI model - the Data Link layer. It provides addressing and channel access control mechanisms that enable several terminals or network nodes to communicate within a multipoint network.
Distributed DoS (DDoS)
Post Office Protocol 3 (POP3)
SOA record
Media Access Control (MAC)
34. Controlling access to a network by analyzing the headers of incoming and outgoing packets - and letting them pass or discarding them based on rule sets created by a network administrator. A packet filter allows or denies packets based on destination
packet filtering
Macro virus
shrink-wrap code attacks
Certificate Authority (CA)
35. A method of password cracking whereby all possible options are systematically enumerated until a match is found. These attacks try every password (or authentication option) - one after another - until successful. Bruteforce attacks take a long time t
Brute-Force Password Attack
parallel scan & 300 sec timeout & 1.25 sec/probe
Active Attack
Internet Protocol (IP)
36. A hardware device used to log keystrokes covertly. Hardware keystroke loggers are very dangerous due to the fact that they cannot be detected through regular software/anti-malware scanning.
hardware keystroke logger
physical security
SMB
TACACS
37. Any network incident that prompts some kind of log entry or other notification.
Acceptable Use Policy (AUP)
firewalking
Zenmap
Event
38. A unique hostname that is used to identify resources on the Internet. Domain names start with a root (.) - then add a top level (.com - .gov - or .mil - for example) - and a given name space.
-PI
Domain Name
Zombie
Defense in Depth
39. A method for detecting malicious code on a computer where the files are compared to signatures of known viruses stored in a database.
signature scanning
Post Office Protocol 3 (POP3)
fragmentation
Secure Multipurpose Mail Extension (S/MIME)
40. A security objective that ensures a resource can be accessed only by authorized users. This is also the property that sensitive information is not disclosed to unauthorized individuals - entities - or processes.
Rijndael
red team
DNS
Confidentiality
41. An extensible mechanism for e-mail. A variety of MIME types exist for sending content such as audio - binary - or video using the Simple Mail Transfer Protocol (SMTP).
suicide hacker
Multipurpose Internet Mail Extensions (MIME)
Anonymizer
Bluejacking
42. Using conversation or some other interaction between people to gather useful information.
piggybacking
Sign in Seal
human-based social engineering
-p <port ranges>
43. An attack that combines a brute-force attack with a dictionary attack.
false negative
Methodology
protocol
hybrid attack
44. 18 U.S.C. 1030
suicide hacker
net use \[target ip]IPC$ '' /user:''
Fraud and related activity in connection with computers
hardware keystroke logger
45. An international organization composed of national standards bodies from over 75 countries. Developed the OSI reference model.
International Organization for Standardization (ISO)
Cryptography
Wi-Fi
Address Resolution Protocol (ARP) table
46. A method of falsely identifying the source of data packets; often used by hackers to make it difficult to trace where an attack originated.
Information Technology (IT) security architecture and framework
parameter tampering
spoofing
S
47. Authentication confirms the identity of the user or device. Authorization determines the privileges (rights) of the user or device. Accounting records the access attempts - both successful and unsuccessful.
Authentication - Authorization - and Accounting (AAA)
route
Three-Way (TCP) Handshake
HIDS
48. The subjective - potential percentage of loss to a specific asset if a specific threat is realized. The exposure factor (EF) is a subjective value the person assessing risk must define.
Vulnerability Management
Destination Unreachable
Exposure Factor
Trusted Computer Base (TCB)
49. A symmetric - block-cipher data-encryption standard that uses a variablelength key that can range from 32 bits to 448 bits.
John the Ripper - LOphtcrack - Ophtcrack - Cain and Abel
rogue access point
Blowfish
-sU
50. All measures and techniques taken to gather information about an intended target. Footprinting can be passive or active.
false rejection rate (FRR)
Auditing
footprinting
Application-Level Attacks