Test your basic knowledge |

CEH: Certified Ethical Hacker

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A string that represents the location of a web resource






2. MAC Flooding






3. TCP connect() scan






4. A type of attack used to deny service to legitimate users of a network resource by intentionally overloading the network with illegitimate TCP connection requests. SYN packets are sent repeatedly to the target - but the corresponding SYN/ACK response






5. 18 U.S.C. 1029






6. The central part of a computer or communications system hardware firmware - and software that implements the basic security procedures for controlling access to system resources.






7. A group of penetration testers that assess the security of an organization - which is often unaware of the existence of the team or the exact assignment.






8. FTP Bounce Attack






9. A hacker who aims to bring down critical infrastructure for a 'cause' and does not worry about the penalties associated with his actions.






10. An electronic version of junk mail. Unsolicited commercial e-mail sent to numerous recipients.






11. A function that is easy to compute in one direction - yet believed to be difficult to compute in the opposite direction (finding its inverse) without special information - called the 'trapdoor.' Widely used in cryptography.






12. A fully qualified domain name consists of a host and domain name - including a top-level domain such as .com - .net - .mil - .edu -and so on.






13. Weakness in an information system - system security procedures - internal controls - or implementation that could be exploited or triggered by a threat source.






14. A decision to reduce the potential for damage to or loss of an IT asset by taking some type of action






15. Version Detection Scan






16. Shifting responsibility from one party to another






17. The ability to trace actions performed on a system to a specific user or system entity.






18. TCP Ping






19. TCP SYN Scan






20. An encryption standard designed by Joan Daemen and Vincent Rijmen. Chosen by a NIST contest to be the Advanced Encryption Standard (AES).






21. A social-engineering effort in which the attacker pretends to be an employee - a valid user - or even an executive to elicit information or access.






22. An attack where the hacker manipulates parameters within the URL string in hopes of modifying data.






23. Ports 20/21






24. The directory service created by Microsoft for use on itsnetworks. Provides a variety of network services using Lightweight Directory Access Protocol (LDAP) - Kerberos-based authentication - and single sign-on for user access to network-based resourc






25. A firewall evasion technique whereby packets are wrapped in HTTP - as a covert channel to the target.






26. A form of fraud in which someone pretends to be someone else by assuming that person's identity - typically in order to access resources or obtain credit and other benefits in that person's name.






27. nmap all output






28. A piece of code intentionally inserted into a software system that will perform a malicious function when specified conditions are met at some future point.






29. A security tool designed to protect a system or network against attacks by comparing traffic patterns against a list of both known attack signatures and general characteristics of how attacks may be carried out. Threats are rated and protective measu






30. A free and popular version of the Unix operating system.






31. A free - open source version of the Berkeley Software Distribution of Unix - often used in embedded systems.






32. A piece of software - provided by the vendor - intended to update or fix known - discovered problems in a computer program or its supporting data.






33. Phases of an attack






34. Wireless LAN standards created by IEEE. 802.11a runs at up to 54Mbps at 5GHz - 802.11b runs at 11Mbps at 2.4GHz - 802.11g runs at 54Mbps at 2.4GHz - and 802.11n can run upwards of 150MBps.






35. A software or hardware defect that often results in system vulnerabilities.






36. The rate at which a biometric system will incorrectly identify an unauthorized individual and allow them access (see false negative).






37. The condition of a resource being ready for use and accessible by authorized users.






38. A type of DNS transfer - where all records from an SOA are transmitted to the requestor. Zone transfers have two options: full (opcode AXFR) and incremental (IXFR).






39. The public portion of an asymmetric key pair typically used to encrypt data or verify signatures. Public keys are shared and are used to encrypt messages.






40. A method of password cracking whereby all possible options are systematically enumerated until a match is found. These attacks try every password (or authentication option) - one after another - until successful. Bruteforce attacks take a long time t






41. A routing protocol developed to be used within a single organization.






42. An organization composed of engineers - scientists - and students who issue standards related to electrical - electronic - and computer engineering.






43. A method in cryptography by which cryptographic keys are exchanged between users - allowing use of a cryptographic algorithm (for example - the Diffie-Hellman key exchange).






44. A wireless access point that has either been installed on a secure company network without explicit authorization from a local network administrator - or has been created to allow a hacker to conduct a man-in-the-middle attack.






45. A sublayer of layer 2 of the OSI model - the Data Link layer. It provides addressing and channel access control mechanisms that enable several terminals or network nodes to communicate within a multipoint network.






46. All measures and techniques taken to gather information about an intended target. Footprinting can be passive or active.






47. An attack where the hacker repeats a portion of a cryptographic exchange in hopes of fooling the system into setting up a communications channel.






48. A value used to control cryptographic operations - such as decryption -encryption - signature generation - and signature verification.






49. A term representing the responsibility managers and their organizations have to provide information security to ensure the type of control - the cost of control - and the deployment of control are appropriate for the system being managed.






50. An attack in which the hacker can derive information from the ciphertext without actually decoding it. Sensitive information can be considered compromised if an adversary can infer its real value with a high level of confidence.