Test your basic knowledge |

CEH: Certified Ethical Hacker

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A section or subset of the network. Often a router or other routing device provides the end point of the segment.






2. A means of restricting access to system resources based on the sensitivity (as represented by a label) of the information contained in the system resource and the formal authorization (that is - clearance) of users to access information of such sensi






3. A method of evaluating the security of a computer system or network by simulating an attack from a malicious source.






4. A malicious computer program with self-replication capabilities that attaches to another file and moves with the host from one computer to another.






5. An HTTP command to transmit text to a web server for processing. The opposite of an HTTP GET.






6. Process of breaking a packet into smaller units when it is being transmitted over a network medium that's unable to support a transmission unit the original size of the packet.






7. A computer virus that infects and spreads in multiple ways.






8. The monetary value assigned to an IT asset.






9. Window Scan






10. Formal description and evaluation of the vulnerabilities in an information system






11. A piece of software - provided by the vendor - intended to update or fix known - discovered problems in a computer program or its supporting data.






12. A self-replicating malicious program that attempts installation beneath antivirus software by directly intercepting the interrupt handlers of the operating system to evade detection.






13. The result of using a private key to encrypt a hash value for identification purposes within a PKI system. The signature can be decoded by the originator's public key - verifying his identity and providing non-repudiation. A valid digital signature g






14. A domain composed of all the systems sharing any given physical transport media. Systems within a collision domain may collide with each other during the transmission of data. Collisions can be managed by CSMA/CD (collision detection) or CSMA/CA (col






15. A small Trojan program that listens on port 777.






16. Injecting traffic into the network to identify the operating system of a device.






17. A type of encryption where the same key is used to encrypt and decrypt the message.






18. The concept of having more than one person required to complete a task






19. An evaluation conducted to determine the potential for damage to or loss of an IT asset.






20. UDP Scan






21. SYN Ping






22. An inspection of a place where a company or individual proposes to work - to gather the necessary information for a design or risk assessment.






23. CAN-SPAM






24. A symmetric key cipher where plaintext bits are combined with a pseudo-random cipher bit stream (keystream) - typically by an exclusive-or (XOR) operation. In a stream cipher the plaintext digits are encrypted one at a time - and the transformation o






25. A comparison metric for different biometric devices and technologies; the point at which the false acceptance rate (FAR) equals the






26. A backlog of packets stored in buffers and waiting to be forwarded over an interface.






27. A step-by-step method of solving a problem. In computing security - an algorithm is a set of mathematical rules (logic) for the process of encryption and decryption






28. The monetary value expected from the occurrence of a risk on an asset. It is mathematically expressed as single loss expectancy (SLE) = asset value (AV)






29. Describes practices in production and development that promote access to the end product's source materials.






30. A trusted entity that issues and revokes public key certificates. In a network - a CA is a trusted entity that issues - manages - and revokes security credentials and public keys for message encryption and/or authentication. Within a public key infra






31. A symmetric - block-cipher data-encryption standard that uses a variablelength key that can range from 32 bits to 448 bits.






32. A TCP flag notifying an originating station that the preceding packet (or packets) has been received.






33. The act of dialing all numbers within an organization to discover open modems.






34. A software or hardware application or device that captures user keystrokes.






35. A software or hardware defect that often results in system vulnerabilities.






36. A wireless access point that has either been installed on a secure company network without explicit authorization from a local network administrator - or has been created to allow a hacker to conduct a man-in-the-middle attack.






37. Controlling access to a network by analyzing the headers of incoming and outgoing packets - and letting them pass or discarding them based on rule sets created by a network administrator. A packet filter allows or denies packets based on destination






38. Port 88






39. An international organization composed of national standards bodies from over 75 countries. Developed the OSI reference model.






40. Used for exchanging structured information - such as XML-based messages - in the implementation of web services






41. ex 02






42. A method in cryptography by which cryptographic keys are exchanged between users - allowing use of a cryptographic algorithm (for example - the Diffie-Hellman key exchange).






43. White hat






44. A systematic process for the assessment of security vulnerabilities.






45. A penetration test in which the ethical hacker has limited knowledge of the intended target(s). Designed to simulate an internal - but non-systemadministrator-level attack.






46. A network architecture framework developed by ISO that describes the communications process between two systems across the Internet in seven distinct layers.






47. Another term for firewalking






48. Sneaky scan timing






49. Attacks on the actual programming code of an application.






50. A wireless networking mode where all clients connect to the wireless network through a central access point.