Test your basic knowledge |

CEH: Certified Ethical Hacker

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A method for detecting malicious code on a computer where the files are compared to signatures of known viruses stored in a database.






2. A connection-oriented - layer 4 protocol for transporting data over network segments. TCP is considered reliable because it guarantees delivery and the proper reordering of transmitted packets. This protocol is used for most long-haul traffic on the






3. A penetration test in which the ethical hacker has limited knowledge of the intended target(s). Designed to simulate an internal - but non-systemadministrator-level attack.






4. A software license agreement; a contract between the 'licensor' and purchaser establishing the right to use the software.






5. The monetary loss that can be expected for an asset due to risk over a one-year period. ALE is the product of the annual rate of occurrence (ARO) and the single loss expectancy (SLE). It is mathematically expressed as ALE = ARO






6. A virus designed to infect the master boot record.






7. A set of related communications protocols operating together as a group to address communication at some or all of the seven layers of the OSI reference model.






8. Window Scan






9. In computer security - this is an algorithm that uses separate keys for encryption and decryption.






10. Layer 2 of the OSI reference model. This layer provides reliable transit of data across a physical link. The Data Link layer is concerned with physical addressing - network topology - access to the network medium - error detection - sequential delive






11. An evaluation consisting of a document review - interviews - and demonstrations - as well as vulnerability scans and hands-on testing.






12. Safeguards or countermeasures to avoid - counteract - or minimize security risks.






13. A piece of code intentionally inserted into a software system that will perform a malicious function when specified conditions are met at some future point.






14. FIN Scan






15. A symmetric key cryptographic algorithm that transforms a block of information at a time using a cryptographic key. For a block cipher algorithm - the length of the input block is the same as the length of the output block.






16. A set of hardware - software - people - policies - and procedures needed to create - manage - distribute - use - store - and revoke digital certificates.






17. The process of a system providing a fully qualified domain name (FQDN) to a local name server - for resolution to its corresponding IP address.






18. The art and science of creating a covert message or image within another message - image - audio - or video file.






19. An evaluation consisting of a document review - interviews - and demonstrations. No hands-on testing is performed.






20. An organization's threshold for the seven areas of information security responsibility. This level is established based on the objectives for maintaining confidentiality - integrity - and availability of the organization's IT assets and infrastructur






21. An e-mail message warning users of a nonexistent virus and encouraging them to pass on the message to other users.






22. A social-engineering attack using computer resources - such as e-mail or IRC.






23. An electronic version of junk mail. Unsolicited commercial e-mail sent to numerous recipients.






24. A measurable - physical characteristic used to recognize the identity - or verify the claimed identity - of an applicant. Facial images - fingerprints - and handwriting samples are all examples of biometrics.






25. A condition that occurs when more data is written to a buffer than it has space to store - and results in data corruption or other system errors. This is usually due to insufficient bounds checking - a bug - or improper configuration in the program c






26. The potential for damage to or loss of an IT asset






27. 1. The path a packet travels to reach the intended destination. Each individual device along the path traveled is called a hop. 2. Information contained on a device containing instructions for reaching other nodes on the network. This information can






28. A list of IP addresses and corresponding MAC addresses stored on a local computer.






29. A group of penetration testers that assess the security of an organization - which is often unaware of the existence of the team or the exact assignment.






30. Injecting traffic into the network to identify the operating system of a device.






31. A programming principle whereby the last piece of data added to the stack is the first piece of data taken off.






32. Formal description and evaluation of the vulnerabilities in an information system






33. Attacks that take advantage of the built-in code and scripts most off-the-shelf applications come with.






34. Management policy and procedures designed to maintain or restore business operations - including computer operations - possibly at an alternate location - in the event of emergencies - system failures - or disaster.






35. A hardware device used to log keystrokes covertly. Hardware keystroke loggers are very dangerous due to the fact that they cannot be detected through regular software/anti-malware scanning.






36. A virus that plants itself in a system's boot sector and infects the master boot record.






37. The process of sending a packet or frame toward the destination. In a switch - messages are forwarded only to the port they are addressed to.






38. The steps taken to gather evidence and information on the targets you wish to attack.






39. CAN-SPAM






40. The central part of a computer or communications system hardware firmware - and software that implements the basic security procedures for controlling access to system resources.






41. White hat






42. A method of permitting only MAC addresses in a preapproved list network access. Addresses not matching are blocked.






43. Access by information systems (or users) communicating from outside the information system security perimeter.






44. A standard that provides best-practice recommendations on information security management for use by those responsible for initiating - implementing - or maintaining Information Security Management Systems (ISMS). Information security is defined with






45. The act of searching for Wi-Fi wireless networks by a person in a moving vehicle - using a portable device.






46. 18 U.S.C. 1030






47. A business - government agency - or educational institution that provides access to the Internet.






48. A means of restricting access to system resources based on the sensitivity (as represented by a label) of the information contained in the system resource and the formal authorization (that is - clearance) of users to access information of such sensi






49. A set of exclusive rights granted by the law of a jurisdiction to the author or creator of an original work - including the right to copy - distribute - and adapt the work.






50. A software or hardware application or device that captures user keystrokes.