Test your basic knowledge |

CEH: Certified Ethical Hacker

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Attacks that take advantage of the built-in code and scripts most off-the-shelf applications come with.






2. The ability to trace actions performed on a system to a specific user or system entity.






3. Host-based IDS. An IDS that resides on the host - protecting against file and folder manipulation and other host-based attacks and actions.






4. An application that monitors a computer or network to identify - and prevent - malware. AV is usually signature-based - and can take multiple actions on defined malware files/activity.






5. Drawing symbols in public places to alert others to an open Wi-Fi network. War chalking can include the SSIDs - administrative passwords to APs - and other information.






6. A penetration test in which the ethical hacker has limited knowledge of the intended target(s). Designed to simulate an internal - but non-systemadministrator-level attack.






7. A string used for authentication in SNMP. The public community string is used for read-only searches - whereas the private community string is used for read/write. Community strings are transmitted in clear text in SNMPv1. SNMPv3 provides encryption






8. Defined in RFC 826 - ARP is a protocol used to map a known IP address to a physical (MAC) address.






9. Port 31337






10. A record showing which user has accessed a given resource and what operations the user performed during a given period.






11. A host designed to collect data on suspicious activity.






12. The contents of a packet. A system attack requires the attacker to deliver a malicious payload that is acted upon and executed by the system.






13. A wireless access point that has either been installed on a secure company network without explicit authorization from a local network administrator - or has been created to allow a hacker to conduct a man-in-the-middle attack.






14. Wireless LAN standards created by IEEE. 802.11a runs at up to 54Mbps at 5GHz - 802.11b runs at 11Mbps at 2.4GHz - 802.11g runs at 54Mbps at 2.4GHz - and 802.11n can run upwards of 150MBps.






15. Actions - devices - procedures - techniques - or other measures intended to reduce the vulnerability of an information system.






16. Layer 2 of the OSI reference model. This layer provides reliable transit of data across a physical link. The Data Link layer is concerned with physical addressing - network topology - access to the network medium - error detection - sequential delive






17. The act of using numerous electronic serial numbers on a cell phone until a valid number is located.






18. Originally an extension of PPP - this is a protocol for authentication used within wireless networks. Works with multiple authentication measures.






19. UDP Scan






20. A type of malware that covertly collects information about a user.






21. Weakness in an information system - system security procedures - internal controls - or implementation that could be exploited or triggered by a threat source.






22. Insane scan timing






23. A routing protocol developed to be used within a single organization.






24. A defined measure of service within a network system






25. Using conversation or some other interaction between people to gather useful information.






26. Also known as a digital certificate - this is an electronic file used to verify a user's identity - providing non-repudiation throughout the system It is also a set of data that uniquely identifies an entity. Certificates contain the entity's public






27. A network traffic management technique designed to allow applications to specify the route a packet will take to a destination - regardless of what the route tables between the two systems say.






28. Part of a service contract where the level of service is formally defined; may be required as part of the initial pen test agreements.






29. An attacker who breaks into computer systems with malicious intent - without the owner's knowledge or permission.






30. A file system used by the Mac OS.






31. A protocol for transporting data packets across a packet switched internetwork (such as the Internet). IP is a routed protocol.






32. A set of rules defined to screen network packets based on source address - destination address - or protocol; these rules determine whether the packet will be forwarded or discarded.






33. TCP connect() scan






34. ACK Scan






35. A systematic process for the assessment of security vulnerabilities.






36. The act of checking some sequence of tokens for the presence of the constituents of some pattern.






37. A suite of protocols used for securing Internet Protocol (IP) communications by authenticating and encrypting each IP packet of a communication session. This suite includes protocols for establishing mutual authentication between agents at the sessio






38. The security property that data is not modified in an unauthorized and undetected manner. Also - the principle and measures taken to ensure that data received is in the exact same condition and state as when it was originally transmitted.






39. A text file stored within a browser by a web server that maintains information about the connection. Cookies are used to store information to maintain a unique but consistent surfing experience - but can also contain authentication parameters. Cookie






40. Phases of an attack






41. 18 U.S.C. 1029






42. A program or piece of code inserted into a system - usually covertly - with the intent of compromising the confidentiality - integrity - or availability of the victim's data - applications - or operating system. Malware consists of viruses - worms -






43. Port 88






44. A device or service designed to obfuscate traffic between a client and the Internet. Generally used to make activity on the Internet as untraceable as possible.






45. A protocol that allows a client computer to request services from a server and the server to return the results.






46. A wireless LAN device that acts as a central point for all wireless traffic. The AP is connected to both the wireless LAN and the wired LAN - providing wireless clients access to network resources.






47. Controls internal to a system designed to resolve vulnerabilities and errors soon after they arise.






48. The combination of all IT assets - resources - components - and systems.






49. A list of IP addresses and corresponding MAC addresses stored on a local computer.






50. Malicious code that uses a polymorphic engine to mutate while keeping the original algorithm intact; the code changes itself each time it runs - but the function of the code will not change.