Test your basic knowledge |

CEH: Certified Ethical Hacker

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The potential for damage to or loss of an IT asset






2. Port 80/81/8080






3. A set of hardware - software - people - policies - and procedures needed to create - manage - distribute - use - store - and revoke digital certificates.






4. A piece of software - provided by the vendor - intended to update or fix known - discovered problems in a computer program or its supporting data.






5. The rate at which a biometric system will incorrectly identify an unauthorized individual and allow them access (see false negative).






6. A network administration command-line tool available for many operating systems for querying the Domain Name System (DNS) to obtain domain name or IP address mappings or any other specific DNS record.






7. A protocol used to pass control and error messages between nodes on the Internet.






8. A record showing which user has accessed a given resource and what operations the user performed during a given period.






9. Originally an extension of PPP - this is a protocol for authentication used within wireless networks. Works with multiple authentication measures.






10. A software license agreement; a contract between the 'licensor' and purchaser establishing the right to use the software.






11. A distance-vector routing protocol that employs the hop count as a routing metric. The 'hold down time -' used to define how long a route is held in memory - is 180 seconds. RIP prevents routing loops by implementing a limit on the number of hops all






12. A situation in which an IDS or other sensor triggers on an event as an intrusion attempt - when it was actually legitimate traffic.






13. The subjective - potential percentage of loss to a specific asset if a specific threat is realized. The exposure factor (EF) is a subjective value the person assessing risk must define.






14. Aggressive scan timing






15. The transmission of digital signals without precise clocking or synchronization.






16. Controlling access to a network by analyzing the headers of incoming and outgoing packets - and letting them pass or discarding them based on rule sets created by a network administrator. A packet filter allows or denies packets based on destination






17. Software code - a portion of data - or sequence of commands intended to take advantage of a bug or vulnerability in order to cause unintended or unanticipated behavior to occur on computer software or hardware.






18. Polymorphic Virus






19. A portion of memory used to temporarily store output or input data.






20. TCP connect() scan






21. Software or firmware intended to perform an unauthorized process that will have an adverse impact on the confidentiality - integrity - or availability of an information system. A virus - worm - Trojan horse - or other code-based entity that infects a






22. The rate at which a biometric system will incorrectly reject an access attempt by an authorized user.






23. A social-engineering attack that manipulates the victim into calling the attacker for help.






24. Port 88






25. Text or data in its encrypted form; the result of plaintext being input into a cryptographic algorithm.






26. A storage buffer that transparently stores data so future requests for the same data can be served faster.






27. A method of evaluating the security of a computer system or network by simulating an attack from a malicious source.






28. MAC Flooding






29. An HTTP command to transmit text to a web server for processing. The opposite of an HTTP GET.






30. A TCP flag notifying an originating station that the preceding packet (or packets) has been received.






31. Hashing algorithm that results in a 128-bit output.






32. CAN-SPAM






33. Port 31337






34. Independent review and examination of records and activities to assess the adequacy of system controls - to ensure compliance with established policies and operational procedures - and to recommend necessary changes.






35. Hex 14






36. Created by the U.S. Federal Communications Commission to uniquely identify mobile devices; often represented as an 11-digit decimal number or eight-digit hexadecimal number.






37. A non-self-replicating program that appears to have a useful purpose - but in reality has a different - malicious purpose.






38. FIN Scan






39. Port 22






40. A protocol that allows a client computer to request services from a server and the server to return the results.






41. Policy stating what users of a system can and cannot do with the organization's assets.






42. The cyclical practice of identifying - classifying - remediating - and mitigating vulnerabilities.






43. An attacker who breaks into computer systems with malicious intent - without the owner's knowledge or permission.






44. A network deployed as a trap to detect - deflect - or deter unauthorized use of information systems.






45. A device that receives and sends data packets between two or more networks; the packet headers and a forwarding table provide the router with the information necessary for deciding which interface to use to forward packets.






46. Physical socket provided on routers and switches for cable connections between a computer and the router/switch. This connection enables the computer to configure - query - and troubleshoot the router/switch by use of a terminal emulator and a comman






47. Layer 7 of the OSI reference model. The Application layer provides services to applications - which allow them access to the network. Protocols such as FTP and SMTP reside here.






48. Unauthorized access to information such as a calendar - contact list - e-mails - and text messages on a wireless device through a Bluetooth connection.






49. Provides router-to-router or host-to-network connections over asynchronous and synchronous circuits.






50. Nmap ml output