Test your basic knowledge |

CEH: Certified Ethical Hacker

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Drawing symbols in public places to alert others to an open Wi-Fi network. War chalking can include the SSIDs - administrative passwords to APs - and other information.






2. Window Scan






3. A class of algorithms for cryptography that use the same cryptographic key for both decryption and encryption.






4. Devices - connected to one or more switches - grouped logically into a single broadcast domain. VLANs enable administrators to divide the devices connected to the switches into multiple VLANs without requiring separate physical switches.






5. Microsoft SID 500






6. An attack where the hacker positions himself between the client and the server - to intercept (and sometimes alter) data traveling between the two.






7. A unit of information formatted according to specific protocols that allows precise transmittal of data from one network node to another. Also called a datagram or data packet - a packet contains a header (container) and a payload (contents). Any IP






8. Directing a protocol from one port to another.






9. A device that receives and sends data packets between two or more networks; the packet headers and a forwarding table provide the router with the information necessary for deciding which interface to use to forward packets.






10. Formerly Redundant Array of Inexpensive Disks; a technology that provides increased storage functions and reliability through redundancy. This is achieved by combining multiple disk drive components into a logical unit - where data is distributed acr






11. The steps taken to gather evidence and information on the targets you wish to attack.






12. Port 135






13. LM Hash for short passwords (under 7)






14. Method used by antivirus software to detect new - unknown viruses that have not yet been identified; based on a piece-by-piece examination of a program - looking for a sequence or sequences of instructions that differentiate the virus from 'normal' p






15. An attack that exploits the common mistake many people make when installing operating systems






16. Attacks that take advantage of the built-in code and scripts most off-the-shelf applications come with.






17. A backlog of packets stored in buffers and waiting to be forwarded over an interface.






18. A type of attack used to deny service to legitimate users of a network resource by intentionally overloading the network with illegitimate TCP connection requests. SYN packets are sent repeatedly to the target - but the corresponding SYN/ACK response






19. A system used by the Securities and Exchange Commission (SEC) for companies and businesses to transmit required filings and information. The EDGAR database performs automated collection - validation - indexing - acceptance - and forwarding of submiss






20. A type of DNS transfer - where all records from an SOA are transmitted to the requestor. Zone transfers have two options: full (opcode AXFR) and incremental (IXFR).






21. Actions - devices - procedures - techniques - or other measures intended to reduce the vulnerability of an information system.






22. A group of penetration testers that assess the security of an organization - which is often unaware of the existence of the team or the exact assignment.






23. Software that has advertisements embedded within. Generally displays ads in the form of pop-ups.






24. A device providing temporary - on-demand - point-to-point network access to users.






25. A value assigned to uniquely identify a single wide area network (WAN) in wireless LANs. SSIDs are broadcast by default - and are sent in the header of every packet. SSIDs provide no encryption or security.






26. A piece of code intentionally inserted into a software system that will perform a malicious function when specified conditions are met at some future point.






27. A means of restricting access to system resources based on the sensitivity (as represented by a label) of the information contained in the system resource and the formal authorization (that is - clearance) of users to access information of such sensi






28. Provides router-to-router or host-to-network connections over asynchronous and synchronous circuits.






29. Defined in RFC 826 - ARP is a protocol used to map a known IP address to a physical (MAC) address.






30. Vulnerability Scanning






31. The act or actions of a hacker to put forward a cause or a political agenda - to affect some societal change - or to shed light on something he feels to be political injustice. These activities are usually illegal in nature.






32. A method of evaluating the security of a computer system or network by simulating an attack from a malicious source.






33. An enumeration technique used to provide information about a computer system; generally used for operating system identification (also known as fingerprinting).






34. A social-engineering attack using computer resources - such as e-mail or IRC.






35. Cracking Tools






36. Set of tools (applications or code) that enables administrator-level accessto a computer or computer network and is designed to obscure the fact that the system has been compromised. Rootkits are dangerous malware entities that provide administrator






37. A value used to control cryptographic operations - such as decryption -encryption - signature generation - and signature verification.






38. A type 0 ICMP message used to reply to ECHO requests. Used with ping to verify network layer connectivity between hosts.






39. Insane scan timing






40. A comparison metric for different biometric devices and technologies; the point at which the false acceptance rate (FAR) equals the






41. Physical socket provided on routers and switches for cable connections between a computer and the router/switch. This connection enables the computer to configure - query - and troubleshoot the router/switch by use of a terminal emulator and a comman






42. Any circumstance or event with the potential to adversely impact organizationaloperations - organizational assets - or individuals through an information system via unauthorized access - destruction - disclosure - modification of information - and/or






43. Malware designed to install some sort of virus - backdoor - and so on - on a target system.






44. A hardware device used to log keystrokes covertly. Hardware keystroke loggers are very dangerous due to the fact that they cannot be detected through regular software/anti-malware scanning.






45. An Application layer protocol - using TCP - for transporting files across an Internet connection. FTP transmits in clear text.






46. A communications protocol used for browsing the Internet.






47. Malicious code that uses a polymorphic engine to mutate while keeping the original algorithm intact; the code changes itself each time it runs - but the function of the code will not change.






48. A connection-oriented - layer 4 protocol for transporting data over network segments. TCP is considered reliable because it guarantees delivery and the proper reordering of transmitted packets. This protocol is used for most long-haul traffic on the






49. Attacks on the actual programming code of an application.






50. Originally an extension of PPP - this is a protocol for authentication used within wireless networks. Works with multiple authentication measures.