Test your basic knowledge |

CEH: Certified Ethical Hacker

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Physical socket provided on routers and switches for cable connections between a computer and the router/switch. This connection enables the computer to configure - query - and troubleshoot the router/switch by use of a terminal emulator and a comman






2. Devices - connected to one or more switches - grouped logically into a single broadcast domain. VLANs enable administrators to divide the devices connected to the switches into multiple VLANs without requiring separate physical switches.






3. A systematic process for the assessment of security vulnerabilities.






4. An information assurance strategy in which multiple layers of defense are placed throughout an Information Technology system.






5. ICMP Type/Code 0-0






6. Normal scan timing






7. A structured set of criteria for evaluating computer security within products and systems produced by European countries; it has been largely replaced by the Common Criteria.






8. In a classful IPv4 subnet - this is the network number with all binary 0s in the subnet part of the number. When written in decimal - the zero subnet has the same number as the classful network number.






9. The public portion of an asymmetric key pair typically used to encrypt data or verify signatures. Public keys are shared and are used to encrypt messages.






10. Software or firmware intended to perform an unauthorized process that will have an adverse impact on the confidentiality - integrity - or availability of an information system. A virus - worm - Trojan horse - or other code-based entity that infects a






11. A legal limit on the amount of financial liability and remedies the organization is responsible for taking on.






12. A TCP flag notifying an originating station that the preceding packet (or packets) has been received.






13. An HTTP command to transmit text to a web server for processing. The opposite of an HTTP GET.






14. A computer virus that infects and spreads in multiple ways.






15. A situation in which an IDS or other sensor triggers on an event as an intrusion attempt - when it was actually legitimate traffic.






16. A term trademarked by the Wi-Fi Alliance - used to define a standard for devices to use to connect to a wireless network.






17. Monitoring of telephone or Internet conversations - typically by covert means.






18. A mode of operation in a wireless LAN in which clients send data directly to one another without utilizing a wireless access point (WAP) - much like a point-to-point wired connection.






19. A hacking method for stealing the cookies used during a session build and replaying them for unauthorized connection purposes.






20. Terminal Access Controller Access-Control System. A remote authentication protocol that is used to communicate with an authentication server commonly used in Unix networks.






21. The secret portion of an asymmetric key pair typically used to decrypt or digitally sign data. The private key is never shared and is always used for decryption - with one notable exception: The private key is used to encrypt the digital signature.






22. Attacks that take advantage of the built-in code and scripts most off-the-shelf applications come with.






23. An authentication method on point-to-point links - using a three-way handshake and a mutually agreed-upon key.






24. A nonroutable IP address range intended for use only within the confines of a single organization - falling within the predefined ranges of 10.0.0.0 - 172.16-31.0.0 - or 192.168.0.0.






25. Establish Null Session






26. IP Protocol Scan






27. An Application layer protocol used by local email clients to retrieve e-mail from a remote server over a TCP/IP connection.






28. Nmap normal output






29. A cryptographic attack where bits are manipulated in the ciphertext itself to generate a predictable outcome in the plaintext once it is decrypted.






30. An attack where the hacker positions himself between the client and the server - to intercept (and sometimes alter) data traveling between the two.






31. A self-replicating malicious program that attempts installation beneath antivirus software by directly intercepting the interrupt handlers of the operating system to evade detection.






32. An attack technique that tricks your DNS server into believing it has received authentic information when - in reality - it has been provided fraudulent data. DNS cache poisoning affects user traffic by sending it to erroneous or malicious end points






33. The rate at which a biometric system will incorrectly identify an unauthorized individual and allow them access (see false negative).






34. Two or more LANs connected by a high-speed line across a large geographical area.






35. An announcement - typically from a software vendor - of a known security vulnerability in a program; often the bulletin contains instructions for the application of a software patch.






36. A symmetric key cryptographic algorithm that transforms a block of information at a time using a cryptographic key. For a block cipher algorithm - the length of the input block is the same as the length of the output block.






37. The exploitation of a security vulnerability






38. An Application layer protocol for managing devices on an IP network.






39. nmap






40. A device that receives and sends data packets between two or more networks; the packet headers and a forwarding table provide the router with the information necessary for deciding which interface to use to forward packets.






41. A utility that sends an ICMP Echo message to determine if a specific IP address is accessible; if the message receives a reply - the address is reachable.






42. The process of embedding information into a digital signal in a way that makes it difficult to remove.






43. The process of using an application to remotely identify open ports on a system (for example - whether systems allow connections through those ports).






44. A cyber attacker who acts without permission from - and gives prior notice to - the resource owner. Also known as a malicious hacker.






45. A file system used by the Mac OS.






46. Port 88






47. Originally an extension of PPP - this is a protocol for authentication used within wireless networks. Works with multiple authentication measures.






48. A type of attack used to deny service to legitimate users of a network resource by intentionally overloading the network with illegitimate TCP connection requests. SYN packets are sent repeatedly to the target - but the corresponding SYN/ACK response






49. A method in cryptography by which cryptographic keys are exchanged between users - allowing use of a cryptographic algorithm (for example - the Diffie-Hellman key exchange).






50. White hat