Test your basic knowledge |

CEH: Certified Ethical Hacker

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Computer software or hardware that can intercept and log traffic passing over a digital network.






2. An Application layer protocol used primarily by Microsoft Windows to provide shared access to printers - files - and serial ports. It also provides an authenticated interprocess communication mechanism.






3. A symmetric key cryptographic algorithm that transforms a block of information at a time using a cryptographic key. For a block cipher algorithm - the length of the input block is the same as the length of the output block.






4. ICMP Timestamp






5. The level of importance assigned to an IT asset






6. An attack where the hacker repeats a portion of a cryptographic exchange in hopes of fooling the system into setting up a communications channel.






7. The contents of a packet. A system attack requires the attacker to deliver a malicious payload that is acted upon and executed by the system.






8. A string that represents the location of a web resource






9. A string used for authentication in SNMP. The public community string is used for read-only searches - whereas the private community string is used for read/write. Community strings are transmitted in clear text in SNMPv1. SNMPv3 provides encryption






10. Method used by antivirus software to detect new - unknown viruses that have not yet been identified; based on a piece-by-piece examination of a program - looking for a sequence or sequences of instructions that differentiate the virus from 'normal' p






11. A NAT method in which multiple internal hosts - using private IP addressing - can be mapped through a single public IP address using the session IDs and port numbers. An internal global IP address can support in excess of 65 -000 concurrent TCP and U






12. A computer network confined to a relatively small area - such as a single building or campus - in which devices connect through high-frequency radio waves using IEEE standard 802.11.






13. An adapter that provides the physical connection to send and receive data between the computer and the network media.






14. Software or hardware components that restrict access between a protected network and the Internet - or between other sets of networks - to block unwanted use or attacks.






15. An attack technique that tricks your DNS server into believing it has received authentic information when - in reality - it has been provided fraudulent data. DNS cache poisoning affects user traffic by sending it to erroneous or malicious end points






16. Black box test






17. Another term for firewalking






18. Freely and readily available information on an organization that can be gathered by a business entity about its competitor's customers - products - and marketing - and can be used by an attacker to build useful information for further attacks.






19. A denial-of-service attack where the attacker sends a ping to the network's broadcast address from the spoofed IP address of the target. All systems in the subnet then respond to the spoofed address - eventually flooding the device.






20. A U.S. Department of Defense (DoD) standard that sets basic requirements for assessing the effectiveness of computer security controls built into a computer system.






21. Layer 7 of the OSI reference model. The Application layer provides services to applications - which allow them access to the network. Protocols such as FTP and SMTP reside here.






22. Occurs when authorized users accumulate excess privileges on a system due to moving from position to position.






23. An e-mail message warning users of a nonexistent virus and encouraging them to pass on the message to other users.






24. Used to find the domain name associated with an IP address; the opposite of a DNS lookup.






25. A value assigned to uniquely identify a single wide area network (WAN) in wireless LANs. SSIDs are broadcast by default - and are sent in the header of every packet. SSIDs provide no encryption or security.






26. Provides router-to-router or host-to-network connections over asynchronous and synchronous circuits.






27. Attacks that take advantage of the built-in code and scripts most off-the-shelf applications come with.






28. An attack that combines a brute-force attack with a dictionary attack.






29. All measures and techniques taken to gather information about an intended target. Footprinting can be passive or active.






30. Hex 12






31. A card with a built-in microprocessor and memory used for identification or financial transactions. The card transfers data to and from a central computer when inserted into a reader.






32. Text or data in its encrypted form; the result of plaintext being input into a cryptographic algorithm.






33. A series of documents and notes on standards used or proposed for use on the Internet; each is identified by a number.






34. Independent review and examination of records and activities to assess the adequacy of system controls - to ensure compliance with established policies and operational procedures - and to recommend necessary changes.






35. A physical security attack where the attacker sifts through garbage and recycle bins for information that may be useful on current and future attacks






36. A method of external testing whereby several systems or resources are used together to effect an attack.






37. Polymorphic Virus






38. A structured set of criteria for evaluating computer security within products and systems produced by European countries; it has been largely replaced by the Common Criteria.






39. An organized collection of data.






40. The process of using easily accessible DNS records to map a target network's internal hosts.






41. Window Scan






42. Ports 20/21






43. An announcement - typically from a software vendor - of a known security vulnerability in a program; often the bulletin contains instructions for the application of a software patch.






44. Hex 14






45. Transmitting one protocol encapsulated inside another protocol.






46. A computer virus that infects and spreads in multiple ways.






47. An inspection of a place where a company or individual proposes to work - to gather the necessary information for a design or risk assessment.






48. The set of all hardware - firmware - and/or software components critical to IT security. Bugs or vulnerabilities occurring inside the TCB might jeopardize the security properties of the entire system.






49. A computer file system architecture used in Windows - OS/2 - and most memory cards.






50. Nmap ml output