Test your basic knowledge |

CEH: Certified Ethical Hacker

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A social-engineering attack that manipulates the victim into calling the attacker for help.






2. Microsoft SID 500






3. A cell phone attack in which the serial number from one cell phone is copied to another in an effort to copy the cell phone.






4. An attack in which a hacker steps between two ends of an already-established communication session and uses specialized tools to guess sequence numbers to take over the channel.






5. An attack that exploits the common mistake many people make when installing operating systems






6. ICMP Timestamp






7. Controls internal to a system designed to resolve vulnerabilities and errors soon after they arise.






8. Actions - devices - procedures - techniques - or other measures intended to reduce the vulnerability of an information system.






9. A nonnumerical - subjective risk evaluation. Used with qualitative assessment (an evaluation of risk that results in ratings of none - low - medium - and high for the probability.)






10. Hex 14






11. Formal description and evaluation of the vulnerabilities in an information system






12. A limit on the amount of time or number of iterations or transmissions in computer and network technology a packet can experience before it will be discarded.






13. A method of evaluating the security of a computer system or network by simulating an attack from a malicious source.






14. A social-engineering attack using computer resources - such as e-mail or IRC.






15. A method of defining what rights and permissions an entity has to a given resource. In networking - Access Control Lists are commonly associated with firewall and router traffic filtering rules.






16. An attack that is direct in nature - usually where the attacker injects something into - or otherwise alters - the network or system target.






17. Port 137/138/139






18. A group of penetration testers that assess the security of an organization - which is often unaware of the existence of the team or the exact assignment.






19. ICMP Type/Code 0-0






20. Network Scanning






21. A communications channel that is being used for a purpose it was not intended for - usually to transfer information secretly.






22. A function that is easy to compute in one direction - yet believed to be difficult to compute in the opposite direction (finding its inverse) without special information - called the 'trapdoor.' Widely used in cryptography.






23. Any item of value or worth to an organization - whether physical or virtual.






24. Port 31337






25. A network traffic management technique designed to allow applications to specify the route a packet will take to a destination - regardless of what the route tables between the two systems say.






26. A connectionless - layer 4 transport protocol. UDP is faster than TCP - but offers no reliability. A best effort is made to deliver the data - but no checks and verifications are performed to guarantee delivery. Therefore - UDP is termed a 'connectio






27. Formerly Redundant Array of Inexpensive Disks; a technology that provides increased storage functions and reliability through redundancy. This is achieved by combining multiple disk drive components into a logical unit - where data is distributed acr






28. An Internet routing protocol used to exchange routing information within an autonomous system.






29. Content Addressable Memory table. Holds all the MAC-address-to-port mappings on a switch.






30. A virus that plants itself in a system's boot sector and infects the master boot record.






31. Window Scan






32. An early network application that provides information on users currently logged on to a machine.






33. A symmetric key cipher where plaintext bits are combined with a pseudo-random cipher bit stream (keystream) - typically by an exclusive-or (XOR) operation. In a stream cipher the plaintext digits are encrypted one at a time - and the transformation o






34. A fully operational off-site data-processing facility equipped with hardware and system software to be used in the event of a disaster.






35. Ping Scan






36. A set of rules defined by a system administrator that indicates whether access is allowed or denied to resource objects.






37. A symmetric - block-cipher data-encryption standard that uses a variablelength key that can range from 32 bits to 448 bits.






38. The art and science of creating a covert message or image within another message - image - audio - or video file.






39. A series of documents and notes on standards used or proposed for use on the Internet; each is identified by a number.






40. When an authorized person allows (intentionally or unintentionally) someone to pass through a secure door - despite the fact that the intruder does not have a badge.






41. A hacker who aims to bring down critical infrastructure for a 'cause' and does not worry about the penalties associated with his actions.






42. The process of recording activity on a system for monitoring and later review.






43. The condition of a resource being ready for use and accessible by authorized users.






44. Unauthorized access to information such as a calendar - contact list - e-mails - and text messages on a wireless device through a Bluetooth connection.






45. A nonroutable IP address range intended for use only within the confines of a single organization - falling within the predefined ranges of 10.0.0.0 - 172.16-31.0.0 - or 192.168.0.0.






46. A type of denial-of-service attack where a hacker sends thousands of SYN packets to the target with spoofed IP addresses.






47. A standard for encrypting e-mail - web pages - and other stream-oriented information transmitted over the Internet.






48. A device that provides access between two or more networks. Gateways are typically used to connect dissimilar networks.






49. A suite of protocols used for securing Internet Protocol (IP) communications by authenticating and encrypting each IP packet of a communication session. This suite includes protocols for establishing mutual authentication between agents at the sessio






50. A storage buffer that transparently stores data so future requests for the same data can be served faster.