Test your basic knowledge |

CEH: Certified Ethical Hacker

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. FIN Scan






2. Calculations of two components of risk: R - the magnitude of the potential loss (L) - and the probability - p - that the loss will occur.






3. A computer network confined to a relatively small area - such as a single building or campus - in which devices connect through high-frequency radio waves using IEEE standard 802.11.






4. An agreement between the penetration tester and the client detailing the activities the tester is permitted to perform.






5. A penetration test in which the ethical hacker has limited knowledge of the intended target(s). Designed to simulate an internal - but non-systemadministrator-level attack.






6. A method for detecting malicious code on a computer where the files are compared to signatures of known viruses stored in a database.






7. A network administration command-line tool available for many operating systems for querying the Domain Name System (DNS) to obtain domain name or IP address mappings or any other specific DNS record.






8. Microsoft SID 500






9. A VPN tunneling protocol with encryption. PPTP connects two nodes in a VPN by using one TCP port for negotiation and authentication and one IP protocol for data transfer.






10. A number assigned during TCP startup sessions that tracks how much information has been moved. This number is used by hackers when hijacking sessions.






11. The rate at which a biometric system will incorrectly identify an unauthorized individual and allow them access (see false negative).






12. A routing protocol developed to be used within a single organization.






13. Wireless LAN standards created by IEEE. 802.11a runs at up to 54Mbps at 5GHz - 802.11b runs at 11Mbps at 2.4GHz - 802.11g runs at 54Mbps at 2.4GHz - and 802.11n can run upwards of 150MBps.






14. The process of using easily accessible DNS records to map a target network's internal hosts.






15. In penetration testing - enumeration is the act of querying a device or network segment thoroughly and systematically for information.






16. The directory service created by Microsoft for use on itsnetworks. Provides a variety of network services using Lightweight Directory Access Protocol (LDAP) - Kerberos-based authentication - and single sign-on for user access to network-based resourc






17. An organized collection of data.






18. An attack where the hacker repeats a portion of a cryptographic exchange in hopes of fooling the system into setting up a communications channel.






19. A wireless access point that has either been installed on a secure company network without explicit authorization from a local network administrator - or has been created to allow a hacker to conduct a man-in-the-middle attack.






20. A list of IP addresses and corresponding MAC addresses stored on a local computer.






21. An API that provides services related to the OSI model's Session layer - allowing applications on separate computers to communicate over a LAN.






22. Port 31337






23. The monetary loss that can be expected for an asset due to risk over a one-year period. ALE is the product of the annual rate of occurrence (ARO) and the single loss expectancy (SLE). It is mathematically expressed as ALE = ARO






24. An evaluation consisting of a document review - interviews - and demonstrations - as well as vulnerability scans and hands-on testing.






25. A suite of protocols used for securing Internet Protocol (IP) communications by authenticating and encrypting each IP packet of a communication session. This suite includes protocols for establishing mutual authentication between agents at the sessio






26. A mode of operation for a block cipher - with the characteristic that each possible block of plaintext has a defined corresponding ciphertext value - and vice versa






27. A device providing temporary - on-demand - point-to-point network access to users.






28. The default network authentication suite of protocols for Windows NT 4.0






29. Monitoring of telephone or Internet conversations - typically by covert means.






30. The steps taken to gather evidence and information on the targets you wish to attack.






31. PI and PT Ping






32. The act of dialing all numbers within an organization to discover open modems.






33. A wireless LAN security standard developed by IEEE. Requires Temporal Key Integrity Protocol (TKIP) and Advanced Encryption Standard (AES).






34. MAC Flooding






35. A tool that helps a company to compare its actual performance with its potential performance.






36. Whether purposeful or the result of malware or other attack - a backdoor is a hidden capability in a system or program for bypassing normal computer authentication systems.






37. Method used by antivirus software to detect new - unknown viruses that have not yet been identified; based on a piece-by-piece examination of a program - looking for a sequence or sequences of instructions that differentiate the virus from 'normal' p






38. A self-replicating - self-propagating - self-contained program that uses networking mechanisms to spread itself.






39. A text file stored within a browser by a web server that maintains information about the connection. Cookies are used to store information to maintain a unique but consistent surfing experience - but can also contain authentication parameters. Cookie






40. Metamorphic Virus






41. ICMP Netmask






42. A card with a built-in microprocessor and memory used for identification or financial transactions. The card transfers data to and from a central computer when inserted into a reader.






43. NSA






44. Port 88






45. A virus that plants itself in a system's boot sector and infects the master boot record.






46. The means by which a recipient of a message can ensure the identity of the sender and that neither party can deny having sent or received the message. The most common method is through digital certificates.






47. Polite scan timing






48. A type 0 ICMP message used to reply to ECHO requests. Used with ping to verify network layer connectivity between hosts.






49. A systematic process for the assessment of security vulnerabilities.






50. A network architecture framework developed by ISO that describes the communications process between two systems across the Internet in seven distinct layers.