Test your basic knowledge |

CEH: Certified Ethical Hacker

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Ping Scan






2. A computer security expert who performs security audits and penetration tests against systems or network segments - with the owner's full knowledge and permission - in an effort to increase security.






3. A software or hardware defect that often results in system vulnerabilities.






4. Port 161/162






5. A protocol for transporting data packets across a packet switched internetwork (such as the Internet). IP is a routed protocol.






6. Defined in RFC 826 - ARP is a protocol used to map a known IP address to a physical (MAC) address.






7. Port 88






8. A method of defining what rights and permissions an entity has to a given resource. In networking - Access Control Lists are commonly associated with firewall and router traffic filtering rules.






9. In regard to hash algorithms - this occurs when two or more distinct inputs produce the same output.






10. Layer 7 of the OSI reference model. The Application layer provides services to applications - which allow them access to the network. Protocols such as FTP and SMTP reside here.






11. The act of secretly listening to the private conversations of others without their consent. This can also be done over telephone lines (wiretapping) - e-mail - instant messaging - and other methods of communication considered private






12. A piece of software - provided by the vendor - intended to update or fix known - discovered problems in a computer program or its supporting data.






13. An Application layer protocol used by local email clients to retrieve e-mail from a remote server over a TCP/IP connection.






14. A partially protected zone on a network - not exposed to the full fury of the Internet - but not fully behind the firewall. This technique is typically used on parts of the network that must remain open to the public (such as a web server) but must a






15. A means of restricting access to system resources based on the sensitivity (as represented by a label) of the information contained in the system resource and the formal authorization (that is - clearance) of users to access information of such sensi






16. Normal scan timing






17. A security tool designed to protect a system or network against attacks by comparing traffic patterns against a list of both known attack signatures and general characteristics of how attacks may be carried out. Threats are rated and protective measu






18. A device providing temporary - on-demand - point-to-point network access to users.






19. Phases of an attack






20. Recording the time - normally in a log file - when an event happens or when information is created or modified.






21. An Ethernet networking system transmitting data at 100 million bits per second (Mbps) - 10 times the speed of an earlier Ethernet standard. Derived from the Ethernet 802.3 standard - it is also known as 100BaseT.






22. A physical security attack where the attacker sifts through garbage and recycle bins for information that may be useful on current and future attacks






23. Paranoid scan timing






24. Controls internal to a system designed to resolve vulnerabilities and errors soon after they arise.






25. The process of pinging each address within a subnet to map potential targets. Ping sweeps are unreliable and easily detectable - but very fast.






26. A record showing which user has accessed a given resource and what operations the user performed during a given period.






27. A method of permitting only MAC addresses in a preapproved list network access. Addresses not matching are blocked.






28. Attacks on the actual programming code of an application.






29. 18 U.S.C. 1029






30. An Internet Protocol Security (IPSec) header used to verify that the contents of a packet have not been modified while the packet was in transit.






31. The process of recording activity on a system for monitoring and later review.






32. Content Addressable Memory table. Holds all the MAC-address-to-port mappings on a switch.






33. Layer 6 of the OSI reference model. The Presentation layer ensures information sent by the Application layer of the sending system will be readable by the Application layer of the receiving system.






34. Port 80/81/8080






35. A situation in which an IDS or other sensor triggers on an event as an intrusion attempt - when it was actually legitimate traffic.






36. A set of rules defined by a system administrator that indicates whether access is allowed or denied to resource objects.






37. An attack that is direct in nature - usually where the attacker injects something into - or otherwise alters - the network or system target.






38. Cracking Tools






39. A security protocol used in IEEE 802.11i to replace WEP without the requirement to replace legacy hardware.






40. Malware designed to install some sort of virus - backdoor - and so on - on a target system.






41. A group of experts that handles computer security incidents.






42. The monetary value assigned to an IT asset.






43. A program designed to execute at a specific time to release malicious code onto the computer system or network.






44. Chronological record of system activities to enable the reconstruction and examination of the sequence of events and changes in an event.






45. A number assigned during TCP startup sessions that tracks how much information has been moved. This number is used by hackers when hijacking sessions.






46. In penetration testing - enumeration is the act of querying a device or network segment thoroughly and systematically for information.






47. Hashing algorithm that results in a 128-bit output.






48. Idlescan






49. An organization's threshold for the seven areas of information security responsibility. This level is established based on the objectives for maintaining confidentiality - integrity - and availability of the organization's IT assets and infrastructur






50. A protocol for exchanging packets over a serial line.