SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The act of checking some sequence of tokens for the presence of the constituents of some pattern.
File Allocation Table (FAT)
asynchronous transmission
pattern matching
Assessment
2. A limited-function version of the Internetworking Operating System (IOS) - held in read-only memory in some earlier models of Cisco devices - capable of performing several seldom-needed low-level functions such as loading a new IOS into Flash memory
signature scanning
-sS
RxBoot
NOP
3. nmap
-p <port ranges>
session hijacking
Echo Reply
protocol
4. A wireless LAN device that acts as a central point for all wireless traffic. The AP is connected to both the wireless LAN and the wired LAN - providing wireless clients access to network resources.
NetBSD
Access Point (AP)
R
Wide Area Network (WAN)
5. A virus designed to infect the master boot record.
out-of-band signaling
Master boot record infector
forwarding
local area network (LAN)
6. Insane scan timing
parallel scan & 75 sec timeout & 0.3 sec/probe
gray hat
network operations center (NOC)
risk assessment
7. A connectionless - layer 4 transport protocol. UDP is faster than TCP - but offers no reliability. A best effort is made to deliver the data - but no checks and verifications are performed to guarantee delivery. Therefore - UDP is termed a 'connectio
inference attack
Hierarchical File System (HFS)
Daemon
User Datagram Protocol (UDP)
8. Literally - 'not balanced or the same.' In computing - asymmetric refers to a difference in networking speeds upstream to downstream. In cryptography - it's the use of more than one key for encryption/authentication purposes.
spyware
honeypot
Asymmetric
-sS
9. A connection-oriented - layer 4 protocol for transporting data over network segments. TCP is considered reliable because it guarantees delivery and the proper reordering of transmitted packets. This protocol is used for most long-haul traffic on the
Filter
Transmission Control Protocol (TCP)
Syslog
Active Fingerprinting
10. Activities to determine the extent to which a security control is implemented correctly - operating as intended - and producing the desired outcome with respect to meeting the security requirements for the system.
802.11 i
Assessment
POST
Administratively Prohibited
11. RPC Scan
-sR
Telnet
risk transference
Electronic Code Book (ECB)
12. The process of using an application to remotely identify open ports on a system (for example - whether systems allow connections through those ports).
Information Technology (IT) asset valuation
-sV
port scanning
Trusted Computer Base (TCB)
13. A utility that sends an ICMP Echo message to determine if a specific IP address is accessible; if the message receives a reply - the address is reachable.
RID Resource identifier
Packet Internet Groper (ping)
session hijacking
Console Port
14. A method for detecting malicious code on a computer where the files are compared to signatures of known viruses stored in a database.
Daisy Chaining
identity theft
gray box testing
signature scanning
15. A wireless networking mode where all clients connect to the wireless network through a central access point.
source routing
Simple Network Management Protocol (SNMP)
infrastructure mode
protocol stack
16. Black box test
Authentication
Zero Subnet
Multipartite virus
No previous knowledge of the network
17. TCP connect() scan
-sT
SAM
sidejacking
A procedure for identifying active hosts on a network.
18. An anonymous connection to an administrative share (IPC$) on a Windows machine. Null sessions allow for enumeration of Windows machines - among other attacks.
firewalking
private key
Virus Hoax
null session
19. The lack of clocking (imposed time ordering) on a bit stream.
Vulnerability Scanning
Simple Mail Transfer Protocol (SMTP)
Destination Unreachable
Asynchronous
20. Also known as the dot-dot-slash attack. Using directory traversal - the attacker attempts to access restricted directories and execute commands outside intended web server directories by using the URL to redirect to an unintended folder location.
Bluejacking
non-repudiation
Directory Traversal
Wi-Fi
21. A unique numerical string - created by a hashing algorithm on a given piece of data - used to verify data integrity. Generally hashes are used to verify the integrity of files after download (comparison to the hash value on the site before download)
Virtual Private Network (VPN)
hash
port knocking
SNMP
22. 18 U.S.C. 1030
Algorithm
Fraud and related activity in connection with computers
Wireless Local Area Network (WLAN)
penetration testing
23. The potential for damage to or loss of an IT asset
Tiger Team
Simple Network Management Protocol (SNMP)
Active Directory (AD)
risk
24. The result of using a private key to encrypt a hash value for identification purposes within a PKI system. The signature can be decoded by the originator's public key - verifying his identity and providing non-repudiation. A valid digital signature g
Digital Signature
Time exceeded
Access Control List (ACL)
Challenge Handshake Authentication Protocol (CHAP)
25. Nmap grepable output
-oG
Fast Ethernet
hacktivism
non-repudiation
26. An electronic version of junk mail. Unsolicited commercial e-mail sent to numerous recipients.
port redirection
spam
Timestamping
operating system attack
27. Drawing symbols in public places to alert others to an open Wi-Fi network. War chalking can include the SSIDs - administrative passwords to APs - and other information.
Media Access Control (MAC)
network access server
Console Port
War Chalking
28. don't ping
National Security Agency
-P0
Acknowledgment (ACK)
Methodology
29. The means by which a recipient of a message can ensure the identity of the sender and that neither party can deny having sent or received the message. The most common method is through digital certificates.
non-repudiation
Echo Reply
Active Fingerprinting
Telnet
30. Shifting responsibility from one party to another
Community String
risk transference
Ciphertext
Algorithm
31. Provides data encryption for IEEE 802.11 wireless networks so data can only be decrypted by the intended recipients.
firewalking
Wi-Fi Protected Access (WPA)
Serial Line Internet Protocol (SLIP)
social engineering
32. An adapter that provides the physical connection to send and receive data between the computer and the network media.
network interface card (NIC)
Temporal Key Integrity Protocol (TKIP)
Assessment
Mantrap
33. A security tool designed to protect a system or network against attacks by comparing traffic patterns against a list of both known attack signatures and general characteristics of how attacks may be carried out. Threats are rated and protective measu
passive attack
CAM table
intrusion prevention system (IPS)
Fast Ethernet
34. A U.S. Department of Defense (DoD) standard that sets basic requirements for assessing the effectiveness of computer security controls built into a computer system.
logic bomb
gray box testing
scope creep
Trusted Computer System Evaluation Criteria (TCSEC)
35. Process of breaking a packet into smaller units when it is being transmitted over a network medium that's unable to support a transmission unit the original size of the packet.
Level II assessment
fragmentation
Zenmap
Simple Object Access Protocol (SOAP)
36. A list of IP addresses and corresponding MAC addresses stored on a local computer.
Address Resolution Protocol (ARP) table
XOR Operation
pattern matching
Simple Object Access Protocol (SOAP)
37. The process of using easily accessible DNS records to map a target network's internal hosts.
Mandatory access control (MAC)
Acknowledgment (ACK)
-sX
DNS enumeration
38. A file system used by the Mac OS.
Presentation layer
Hierarchical File System (HFS)
shrink-wrap code attacks
Backdoor
39. The exploitation of a security vulnerability
security bulletins
Audit Data
security breach or security incident
Asymmetric
40. Terminal Access Controller Access-Control System. A remote authentication protocol that is used to communicate with an authentication server commonly used in Unix networks.
hash
script kiddie
CAM table
TACACS
41. Software that has advertisements embedded within. Generally displays ads in the form of pop-ups.
suicide hacker
security breach or security incident
Information Technology Security Evaluation Criteria (ITSEC)
Adware
42. 18 U.S.C. 1029
False Acceptance Rate (FAR)
Possession of access devices
-sW
Digital Certificate
43. MAC Flooding
Overwhelm CAM table to convert switch to hub mode
personal identification number (PIN)
symmetric encryption
spyware
44. Defined in RFC 826 - ARP is a protocol used to map a known IP address to a physical (MAC) address.
shrink-wrap code attacks
-sR
Trusted Computer Base (TCB)
Address Resolution Protocol (ARP)
45. Devices - connected to one or more switches - grouped logically into a single broadcast domain. VLANs enable administrators to divide the devices connected to the switches into multiple VLANs without requiring separate physical switches.
Self Replicating
gap analysis
White Box Testing
Virtual Local Area Network (VLAN)
46. An attack where the hacker positions himself between the client and the server - to intercept (and sometimes alter) data traveling between the two.
Virus Hoax
File Transfer Protocol (FTP)
encryption
Man-in-the-middle attack
47. Baseband LAN specification developed by Xerox Corporation - Intel - and Digital Equipment Corporation. One of the least expensive - most widely deployed networking standards; uses the CSMA/CD method of media access control.
Ethernet
Lightweight Directory Access Protocol (LDAP)
A series of messages sent by someone attempting to break into a computer to learn about the computer's network services.
-oA
48. A three-step process computers execute to negotiate a connection with one another. The three steps are SYN - SYN/ACK - ACK.
Trojan Horse
RPC-DCOM
Three-Way (TCP) Handshake
End User Licensing Agreement (EULA)
49. Recording the time - normally in a log file - when an event happens or when information is created or modified.
replay attack
Application Layer
Timestamping
security by obscurity
50. A technology where you advertise one IP address externally and data packets are rerouted to the appropriate IP address inside your network by a device providing translation services. In this way - IP addresses of machines on your internal network are
scope creep
Bit Flipping
R
Network Address Translation (NAT)