SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CEH: Certified Ethical Hacker
Start Test
Study First
Subjects
:
certifications
,
ceh
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. ICMP Timestamp
security controls
NOP
port scanning
-PP
2. The organization that governs the Internet's top-level domains - IP address allocation - and port number assignments.
Internet Assigned Number Authority (IANA)
rule-based access control
Wiretapping
Traceroute
3. An Application layer protocol used primarily by Microsoft Windows to provide shared access to printers - files - and serial ports. It also provides an authenticated interprocess communication mechanism.
SYN attack
Common Internet File System/Server Message Block
Block Cipher
-oA
4. A symmetric - block-cipher data-encryption standard that uses a variablelength key that can range from 32 bits to 448 bits.
Blowfish
-sI
Anonymizer
serialize scans & 15 sec wait
5. A systematic process for the assessment of security vulnerabilities.
identity theft
INFOSEC Assessment Methodology (IAM)
key exchange protocol
Transmission Control Protocol (TCP)
6. Drawing symbols in public places to alert others to an open Wi-Fi network. War chalking can include the SSIDs - administrative passwords to APs - and other information.
War Chalking
limitation of liability and remedies
Mandatory access control (MAC)
Block Cipher
7. A condition that occurs when more data is written to a buffer than it has space to store - and results in data corruption or other system errors. This is usually due to insufficient bounds checking - a bug - or improper configuration in the program c
Secure Multipurpose Mail Extension (S/MIME)
Buffer Overflow
Bit Flipping
intrusion prevention system (IPS)
8. A physical security attack where the attacker sifts through garbage and recycle bins for information that may be useful on current and future attacks
Certificate
Packet Internet Groper (ping)
Dumpster Diving
Master boot record infector
9. A TCP flag notifying an originating station that the preceding packet (or packets) has been received.
Database
Acknowledgment (ACK)
single loss expectancy (SLE)
integrity
10. A network traffic management technique designed to allow applications to specify the route a packet will take to a destination - regardless of what the route tables between the two systems say.
steganography
source routing
Challenge Handshake Authentication Protocol (CHAP)
Asymmetric
11. An Internet routing protocol used to exchange routing information within an autonomous system.
Banner Grabbing
stream cipher
Interior Gateway Protocol (IGP)
security kernel
12. A set of exclusive rights granted by the law of a jurisdiction to the author or creator of an original work - including the right to copy - distribute - and adapt the work.
Interior Gateway Protocol (IGP)
NetBus
-PS
Copyright
13. A unit of information formatted according to specific protocols that allows precise transmittal of data from one network node to another. Also called a datagram or data packet - a packet contains a header (container) and a payload (contents). Any IP
port knocking
-sV
packet
Computer Emergency Response Team (CERT)
14. A type of denial-of-service attack where a hacker sends thousands of SYN packets to the target with spoofed IP addresses.
Annualized Loss Expectancy (ALE)
Fraud and related activity in connection with computers
Zone transfer
SYN attack
15. A brand name of analog scrambling and de-scrambling equipment for cable and satellite television - invented primarily to keep consumer Television receive-only (TVRO) satellite equipment from receiving TV programming except on a subscription basis.
Open System Interconnection (OSI) Reference Model
Videocipher II Satellite Encryption System
Acknowledgment (ACK)
encryption
16. A data encryption/decryption program often used for e-mail and file storage.
Countermeasures
security kernel
Tunneling Virus
Pretty Good Privacy (PGP)
17. The ability to trace actions performed on a system to a specific user or system entity.
Baseline
Accountability
Network Basic Input/Output System (NetBIOS)
phishing
18. Version Detection Scan
queue
-sV
parallel scan & 300 sec timeout & 1.25 sec/probe
phishing
19. A Unix-like computer operating system descending from the BSD. Open-BSD includes a number of security features absent or optional in other operating systems.
Denial of Service (DoS)
OpenBSD
hardware keystroke logger
-p <port ranges>
20. Controlling access to a network by analyzing the headers of incoming and outgoing packets - and letting them pass or discarding them based on rule sets created by a network administrator. A packet filter allows or denies packets based on destination
XOR Operation
node
self encrypting
packet filtering
21. Port 22
keylogger
SID
SSH
Written Authorization
22. A method of network traffic filtering that monitors the entire communications process - including the originator of the session and from which direction it started.
Mandatory access control (MAC)
War Chalking
stateful packet filtering
sniffer
23. A computer security expert who performs security audits and penetration tests against systems or network segments - with the owner's full knowledge and permission - in an effort to increase security.
Information Technology (IT) security architecture and framework
halo effect
Access Creep
Ethical Hacker
24. The process of embedding information into a digital signal in a way that makes it difficult to remove.
Digital Watermarking
RxBoot
-sX
red team
25. Terminal Access Controller Access-Control System. A remote authentication protocol that is used to communicate with an authentication server commonly used in Unix networks.
shoulder surfing
Network Basic Input/Output System (NetBIOS)
TACACS
Availability
26. A security protocol for wireless local area networks defined in the 802.11b standard; intended to provide the same level of security as a wired LAN. WEP is not considered strong security - although it does authenticate clients to access points - encr
private key
-p <port ranges>
Wired Equivalent Privacy (WEP)
Master boot record infector
27. A social-engineering attack that manipulates the victim into calling the attacker for help.
Digital Signature
Countermeasures
HTTP tunneling
reverse social engineering
28. A term trademarked by the Wi-Fi Alliance - used to define a standard for devices to use to connect to a wireless network.
Hypertext Transfer Protocol Secure (HTTPS)
Ethical Hacker
Wi-Fi
Domain Name System (DNS)
29. A NAT method in which multiple internal hosts - using private IP addressing - can be mapped through a single public IP address using the session IDs and port numbers. An internal global IP address can support in excess of 65 -000 concurrent TCP and U
Syslog
intranet
File Allocation Table (FAT)
Port Address Translation (PAT)
30. Attacks that take advantage of the built-in code and scripts most off-the-shelf applications come with.
shrink-wrap code attacks
Wiretapping
Port Address Translation (PAT)
penetration testing
31. ACK Scan
-sA
Worm
Application Layer
initial sequence number (ISN)
32. A technology where you advertise one IP address externally and data packets are rerouted to the appropriate IP address inside your network by a device providing translation services. In this way - IP addresses of machines on your internal network are
ring topology
sniffer
keylogger
Network Address Translation (NAT)
33. A standard for encrypting and authenticating MIME data; used primarily for Internet e-mail.
Information Technology (IT) asset valuation
risk transference
service level agreements (SLAs)
Secure Multipurpose Mail Extension (S/MIME)
34. The public portion of an asymmetric key pair typically used to encrypt data or verify signatures. Public keys are shared and are used to encrypt messages.
public key
Worm
replay attack
Asynchronous
35. Also known as the dot-dot-slash attack. Using directory traversal - the attacker attempts to access restricted directories and execute commands outside intended web server directories by using the URL to redirect to an unintended folder location.
Hypertext Transfer Protocol (HTTP)
--randomize_hosts -O OS fingerprinting
Audit Trail
Directory Traversal
36. A group of experts that handles computer security incidents.
serialize scans & 15 sec wait
Simple Object Access Protocol (SOAP)
social engineering
security incident response team (SIRT)
37. A standard that provides best-practice recommendations on information security management for use by those responsible for initiating - implementing - or maintaining Information Security Management Systems (ISMS). Information security is defined with
Electronic serial number
Third Party
ISO 17799
security incident response team (SIRT)
38. A method of evaluating the security of a computer system or network by simulating an attack from a malicious source.
Simple Mail Transfer Protocol (SMTP)
penetration testing
Asymmetric Algorithm
A
39. The process of attaching a particular protocol header and trailer to a unit of data before transmission on the network. Occurs at layer 2 of the OSI reference model.
encapsulation
Smurf attack
Real application encompassing Trojan
Ciphertext
40. LAN standard - defined by ANSI X3T9.5 - specifying a 100Mbps token-passing network using fiber-optic cable and a dualring architecture for redundancy - with transmission distances of up to two kilometers.
Fiber Distributed Data Interface (FDDI)
ping sweep
keylogger
Wide Area Network (WAN)
41. An industry standard protocol used for accessing and managing information within a directory service; an application protocol for querying and modifying data using directory services running over TCP/IP.
Internet Protocol (IP)
false negative
Lightweight Directory Access Protocol (LDAP)
enumeration
42. In penetration testing - this is a method of testing the security of a system or subnet without any previous knowledge of the device or network. Designed to simulate an attack by an outside intruder (usually from the Internet).
gray hat
personal identification number (PIN)
Collision Domain
Black Box Testing
43. The contents of a packet. A system attack requires the attacker to deliver a malicious payload that is acted upon and executed by the system.
payload
Time Bomb
public key
ring topology
44. Whether purposeful or the result of malware or other attack - a backdoor is a hidden capability in a system or program for bypassing normal computer authentication systems.
Cache
parameter tampering
Backdoor
Simple Network Management Protocol (SNMP)
45. An organized collection of data.
Ciphertext
Database
Address Resolution Protocol (ARP) table
reconnaissance
46. Self-contained network with a limited number of participants who extend limited trust to one another in order to accomplish an agreed-upon goal.
Secure Multipurpose Mail Extension (S/MIME)
intranet
Dumpster Diving
Media Access Control (MAC)
47. A computer file system architecture used in Windows - OS/2 - and most memory cards.
Kerberos
Eavesdropping
File Allocation Table (FAT)
Three-Way (TCP) Handshake
48. The change or growth of a project's scope
Timestamping
CIA triangle
Media Access Control (MAC)
scope creep
49. Xmas Tree scan
flood
-sX
Interior Gateway Protocol (IGP)
inference attack
50. A unique hostname that is used to identify resources on the Internet. Domain names start with a root (.) - then add a top level (.com - .gov - or .mil - for example) - and a given name space.
false negative
TACACS
Domain Name
POST