Test your basic knowledge |

CEH: Certified Ethical Hacker

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A pen testing method where the attacker knows all information about the internal network. It is designed to simulate an attack by a disgruntled systems administrator - or similar level.






2. The ability to trace actions performed on a system to a specific user or system entity.






3. The concept of having more than one person required to complete a task






4. The secret portion of an asymmetric key pair typically used to decrypt or digitally sign data. The private key is never shared and is always used for decryption - with one notable exception: The private key is used to encrypt the digital signature.






5. A method in cryptography by which cryptographic keys are exchanged between users - allowing use of a cryptographic algorithm (for example - the Diffie-Hellman key exchange).






6. A connectionless - layer 4 transport protocol. UDP is faster than TCP - but offers no reliability. A best effort is made to deliver the data - but no checks and verifications are performed to guarantee delivery. Therefore - UDP is termed a 'connectio






7. A term trademarked by the Wi-Fi Alliance - used to define a standard for devices to use to connect to a wireless network.






8. A wireless LAN security standard developed by IEEE. Requires Temporal Key Integrity Protocol (TKIP) and Advanced Encryption Standard (AES).






9. A symmetric key cryptographic algorithm that transforms a block of information at a time using a cryptographic key. For a block cipher algorithm - the length of the input block is the same as the length of the output block.






10. Nmap ml output






11. Policy stating what users of a system can and cannot do with the organization's assets.






12. The lack of clocking (imposed time ordering) on a bit stream.






13. Port 137/138/139






14. Physical socket provided on routers and switches for cable connections between a computer and the router/switch. This connection enables the computer to configure - query - and troubleshoot the router/switch by use of a terminal emulator and a comman






15. An e-mail message warning users of a nonexistent virus and encouraging them to pass on the message to other users.






16. A self-replicating malicious program that attempts installation beneath antivirus software by directly intercepting the interrupt handlers of the operating system to evade detection.






17. A piece of code intentionally inserted into a software system that will perform a malicious function when specified conditions are met at some future point.






18. A device that receives and sends data packets between two or more networks; the packet headers and a forwarding table provide the router with the information necessary for deciding which interface to use to forward packets.






19. A three-step process computers execute to negotiate a connection with one another. The three steps are SYN - SYN/ACK - ACK.






20. The change or growth of a project's scope






21. A condition that occurs when more data is written to a buffer than it has space to store - and results in data corruption or other system errors. This is usually due to insufficient bounds checking - a bug - or improper configuration in the program c






22. A function that is easy to compute in one direction - yet believed to be difficult to compute in the opposite direction (finding its inverse) without special information - called the 'trapdoor.' Widely used in cryptography.






23. Layer 2 of the OSI reference model. This layer provides reliable transit of data across a physical link. The Data Link layer is concerned with physical addressing - network topology - access to the network medium - error detection - sequential delive






24. A free and popular version of the Unix operating system.






25. A command used in HTTP and FTP to retrieve a file from a server.






26. A distance-vector routing protocol that employs the hop count as a routing metric. The 'hold down time -' used to define how long a route is held in memory - is 180 seconds. RIP prevents routing loops by implementing a limit on the number of hops all






27. A computer file system architecture used in Windows - OS/2 - and most memory cards.






28. The science or study of protecting information - whether in transit or at rest - by using techniques to render the information unusable to anyone who does not possess the means to decrypt it.






29. A method of network traffic filtering that monitors the entire communications process - including the originator of the session and from which direction it started.






30. Port 22






31. A utility that traces a packet from your computer to an Internet host - showing how many hops the packet takes to reach the host and how long the packet requires to complete the hop.






32. A type of malware that covertly collects information about a user.






33. A person or entity indirectly involved in a relationship between two principles.






34. A method of defining what rights and permissions an entity has to a given resource. In networking - Access Control Lists are commonly associated with firewall and router traffic filtering rules.






35. ICMP Timestamp






36. A set of hardware - software - people - policies - and procedures needed to create - manage - distribute - use - store - and revoke digital certificates.






37. Also known as the dot-dot-slash attack. Using directory traversal - the attacker attempts to access restricted directories and execute commands outside intended web server directories by using the URL to redirect to an unintended folder location.






38. An organized collection of data.






39. Software used to bind a Trojan and a legitimate program together so the Trojan will be installed when the legitimate program is executed.






40. An attack where the hacker repeats a portion of a cryptographic exchange in hopes of fooling the system into setting up a communications channel.






41. The organization that governs the Internet's top-level domains - IP address allocation - and port number assignments.






42. Hex 14






43. Chronological record of system activities to enable the reconstruction and examination of the sequence of events and changes in an event.






44. A method of falsely identifying the source of data packets; often used by hackers to make it difficult to trace where an attack originated.






45. Security measures - such as a locked door - perimeter fence - or security guard - to prevent or deter physical access to a facility - resource - or information stored on physical media.






46. A penetration test in which the ethical hacker has limited knowledge of the intended target(s). Designed to simulate an internal - but non-systemadministrator-level attack.






47. The combination of all IT assets - resources - components - and systems.






48. An Internet routing protocol used to exchange routing information within an autonomous system.






49. A command that instructs the system processor to do nothing. Many overflow attacks involve stringing several NOP operations together (known as a NOP sled).






50. FTP Bounce Attack