Test your basic knowledge |

CEH: Certified Ethical Hacker

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. An authentication method on point-to-point links - using a three-way handshake and a mutually agreed-upon key.






2. A software or hardware application or device that captures user keystrokes.






3. A connection-oriented - layer 4 protocol for transporting data over network segments. TCP is considered reliable because it guarantees delivery and the proper reordering of transmitted packets. This protocol is used for most long-haul traffic on the






4. The cyclical practice of identifying - classifying - remediating - and mitigating vulnerabilities.






5. A firewall evasion technique whereby packets are wrapped in HTTP - as a covert channel to the target.






6. A person or entity indirectly involved in a relationship between two principles.






7. An evaluation consisting of a document review - interviews - and demonstrations. No hands-on testing is performed.






8. The set of all hardware - firmware - and/or software components critical to IT security. Bugs or vulnerabilities occurring inside the TCB might jeopardize the security properties of the entire system.






9. A method of password cracking whereby all possible options are systematically enumerated until a match is found. These attacks try every password (or authentication option) - one after another - until successful. Bruteforce attacks take a long time t






10. Manipulating a search string with additional specific operators to search for vulnerabilities or very specific information.






11. A method of defining what rights and permissions an entity has to a given resource. In networking - Access Control Lists are commonly associated with firewall and router traffic filtering rules.






12. A connectionless - layer 4 transport protocol. UDP is faster than TCP - but offers no reliability. A best effort is made to deliver the data - but no checks and verifications are performed to guarantee delivery. Therefore - UDP is termed a 'connectio






13. The basis of this kind of security is that an individual user - or program operating on the user's behalf - is allowed to specify explicitly the types of access other users (or programs executing on their behalf) may have to information under the use






14. Freely and readily available information on an organization that can be gathered by a business entity about its competitor's customers - products - and marketing - and can be used by an attacker to build useful information for further attacks.






15. Software or hardware components that restrict access between a protected network and the Internet - or between other sets of networks - to block unwanted use or attacks.






16. A card with a built-in microprocessor and memory used for identification or financial transactions. The card transfers data to and from a central computer when inserted into a reader.






17. Start of Authority record. This record identifies the primary name server for the zone. The SOA record contains the host name of the server responsible for all DNS records within the namespace - as well as the basic properties of the domain.






18. Aggressive scan timing






19. Port 161/162






20. Microsoft SID 500






21. A networking configuration where all nodes are connected in a circle with no terminated ends on the cable.






22. An unknown deficiency in software or some other product that results in a security vulnerability being identified.






23. Describes practices in production and development that promote access to the end product's source materials.






24. An organized collection of data.






25. Set of tools (applications or code) that enables administrator-level accessto a computer or computer network and is designed to obscure the fact that the system has been compromised. Rootkits are dangerous malware entities that provide administrator






26. A method used to prevent IDS detection by dividing the request into multiple parts that are sent in different packets






27. All measures and techniques taken to gather information about an intended target. Footprinting can be passive or active.






28. A communications channel that is being used for a purpose it was not intended for - usually to transfer information secretly.






29. Vulnerability Scanning






30. The concept of having more than one person required to complete a task






31. A configuration of a network card that makes the card pass all traffic it receives to the central processing unit rather than just frames addressed to it






32. A nontechnical method of hacking. Social engineering is the art of manipulating people - whether in person (human-based) or via computing methods (computer-based) - into providing sensitive information.






33. A backup facility with the electrical and physical components of a computer facility - but with no computer equipment in place. The site is ready to receive the necessary replacement computer equipment in the event the user has to move from his main






34. An attack where the hacker repeats a portion of a cryptographic exchange in hopes of fooling the system into setting up a communications channel.






35. A protocol for exchanging packets over a serial line.






36. Window Scan






37. A systematic process for the assessment of security vulnerabilities.






38. A distance-vector routing protocol that employs the hop count as a routing metric. The 'hold down time -' used to define how long a route is held in memory - is 180 seconds. RIP prevents routing loops by implementing a limit on the number of hops all






39. Originally an extension of PPP - this is a protocol for authentication used within wireless networks. Works with multiple authentication measures.






40. UDP Scan






41. The ability to trace actions performed on a system to a specific user or system entity.






42. A virus designed to infect the master boot record.






43. Part of a service contract where the level of service is formally defined; may be required as part of the initial pen test agreements.






44. The act of checking some sequence of tokens for the presence of the constituents of some pattern.






45. The rate at which a biometric system will incorrectly reject an access attempt by an authorized user.






46. A method of permitting only MAC addresses in a preapproved list network access. Addresses not matching are blocked.






47. A self-replicating malicious program that attempts installation beneath antivirus software by directly intercepting the interrupt handlers of the operating system to evade detection.






48. A method in cryptography by which cryptographic keys are exchanged between users - allowing use of a cryptographic algorithm (for example - the Diffie-Hellman key exchange).






49. An API that provides services related to the OSI model's Session layer - allowing applications on separate computers to communicate over a LAN.






50. An Application layer protocol for sending electronic mail between servers.