Test your basic knowledge |

CEH: Certified Ethical Hacker

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. An unknown deficiency in software or some other product that results in a security vulnerability being identified.






2. A sublayer of layer 2 of the OSI model - the Data Link layer. It provides addressing and channel access control mechanisms that enable several terminals or network nodes to communicate within a multipoint network.






3. A string used for authentication in SNMP. The public community string is used for read-only searches - whereas the private community string is used for read/write. Community strings are transmitted in clear text in SNMPv1. SNMPv3 provides encryption






4. A small Trojan program that listens on port 777.






5. Created by the U.S. Federal Communications Commission to uniquely identify mobile devices; often represented as an 11-digit decimal number or eight-digit hexadecimal number.






6. A distance-vector routing protocol that employs the hop count as a routing metric. The 'hold down time -' used to define how long a route is held in memory - is 180 seconds. RIP prevents routing loops by implementing a limit on the number of hops all






7. A configuration of a network card that makes the card pass all traffic it receives to the central processing unit rather than just frames addressed to it






8. Hex 29






9. ICMP Type/Code 8






10. Text or data in its encrypted form; the result of plaintext being input into a cryptographic algorithm.






11. A method in cryptography by which cryptographic keys are exchanged between users - allowing use of a cryptographic algorithm (for example - the Diffie-Hellman key exchange).






12. ICMP Netmask






13. Sneaky scan timing






14. Version Detection Scan






15. Security identifier. The method by which Windows identifies user - group - and computer accounts for rights and permissions.






16. Another term for firewalking






17. A nontechnical method of hacking. Social engineering is the art of manipulating people - whether in person (human-based) or via computing methods (computer-based) - into providing sensitive information.






18. Layer 7 of the OSI reference model. The Application layer provides services to applications - which allow them access to the network. Protocols such as FTP and SMTP reside here.






19. Malicious code that uses a polymorphic engine to mutate while keeping the original algorithm intact; the code changes itself each time it runs - but the function of the code will not change.






20. An evaluation consisting of a document review - interviews - and demonstrations - as well as vulnerability scans and hands-on testing.






21. A computer security expert who performs security audits and penetration tests against systems or network segments - with the owner's full knowledge and permission - in an effort to increase security.






22. Traffic-passing technique used by bridges and switches in which traffic received on an interface is sent out all interfaces on the device except the interface on which the information was originally received. Traffic on a switch is flooded when it is






23. An Internet Protocol Security (IPSec) header used to verify that the contents of a packet have not been modified while the packet was in transit.






24. Polite scan timing






25. Process of breaking a packet into smaller units when it is being transmitted over a network medium that's unable to support a transmission unit the original size of the packet.






26. A computer file system architecture used in Windows - OS/2 - and most memory cards.






27. Freely and readily available information on an organization that can be gathered by a business entity about its competitor's customers - products - and marketing - and can be used by an attacker to build useful information for further attacks.






28. A self-replicating malicious program that attempts installation beneath antivirus software by directly intercepting the interrupt handlers of the operating system to evade detection.






29. A program designed to browse websites in an automated - methodical manner. Sometimes these programs are used to harvest information from websites - such as e-mail addresses.






30. A method of external testing whereby several systems or resources are used together to effect an attack.






31. Port 53






32. Controls internal to a system designed to resolve vulnerabilities and errors soon after they arise.






33. The rate at which a biometric system will incorrectly identify an unauthorized individual and allow them access (see false negative).






34. Defined in RFC 826 - ARP is a protocol used to map a known IP address to a physical (MAC) address.






35. A set of rules defined to screen network packets based on source address - destination address - or protocol; these rules determine whether the packet will be forwarded or discarded.






36. A computer virus that infects and spreads in multiple ways.






37. The process of using an application to remotely identify open ports on a system (for example - whether systems allow connections through those ports).






38. Also known as the dot-dot-slash attack. Using directory traversal - the attacker attempts to access restricted directories and execute commands outside intended web server directories by using the URL to redirect to an unintended folder location.






39. A standard for encrypting and authenticating MIME data; used primarily for Internet e-mail.






40. Port 31337






41. A trusted entity that issues and revokes public key certificates. In a network - a CA is a trusted entity that issues - manages - and revokes security credentials and public keys for message encryption and/or authentication. Within a public key infra






42. The rate at which a biometric system will incorrectly reject an access attempt by an authorized user.






43. Used to find the domain name associated with an IP address; the opposite of a DNS lookup.






44. An Application layer protocol used by local email clients to retrieve e-mail from a remote server over a TCP/IP connection.






45. A portion of memory used to temporarily store output or input data.






46. A Canonical Name record within DNS - used to provide an alias for a domain name.






47. Hex 10






48. Looking over an authorized user's shoulder in order to steal information (such as authentication information).






49. Wireless LAN standards created by IEEE. 802.11a runs at up to 54Mbps at 5GHz - 802.11b runs at 11Mbps at 2.4GHz - 802.11g runs at 54Mbps at 2.4GHz - and 802.11n can run upwards of 150MBps.






50. In a classful IPv4 subnet - this is the network number with all binary 0s in the subnet part of the number. When written in decimal - the zero subnet has the same number as the classful network number.