Test your basic knowledge |

CEH: Certified Ethical Hacker

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A security objective that ensures a resource can be accessed only by authorized users. This is also the property that sensitive information is not disclosed to unauthorized individuals - entities - or processes.






2. A number assigned during TCP startup sessions that tracks how much information has been moved. This number is used by hackers when hijacking sessions.






3. Provides router-to-router or host-to-network connections over asynchronous and synchronous circuits.






4. Start of Authority record. This record identifies the primary name server for the zone. The SOA record contains the host name of the server responsible for all DNS records within the namespace - as well as the basic properties of the domain.






5. Chronological record of system activities to enable the reconstruction and examination of the sequence of events and changes in an event.






6. Version Detection Scan






7. In penetration testing - enumeration is the act of querying a device or network segment thoroughly and systematically for information.






8. A method of external testing whereby several systems or resources are used together to effect an attack.






9. Drawing symbols in public places to alert others to an open Wi-Fi network. War chalking can include the SSIDs - administrative passwords to APs - and other information.






10. An e-mail protection method using a secret message or image that can be referenced on any official communication with the site; if an e-mail is received without the image or message - the recipient knows it is not legitimate.






11. A data encryption/decryption program often used for e-mail and file storage.






12. ICMP Type/Code 0-0






13. An attack technique that tricks your DNS server into believing it has received authentic information when - in reality - it has been provided fraudulent data. DNS cache poisoning affects user traffic by sending it to erroneous or malicious end points






14. An outdated symmetric cipher encryption algorithm - previously U.S. government-approved and used by business and civilian government agencies. DES is no longer considered secure due to the ease with which the entire keyspace can be attempted using mo






15. A mathematical operation requiring two binary inputs: If the inputs match - the output is a 0 - otherwise it is a 1.






16. An international organization composed of national standards bodies from over 75 countries. Developed the OSI reference model.






17. An organization composed of engineers - scientists - and students who issue standards related to electrical - electronic - and computer engineering.






18. The act of secretly listening to the private conversations of others without their consent. This can also be done over telephone lines (wiretapping) - e-mail - instant messaging - and other methods of communication considered private






19. A value assigned to uniquely identify a single wide area network (WAN) in wireless LANs. SSIDs are broadcast by default - and are sent in the header of every packet. SSIDs provide no encryption or security.






20. The rate at which a biometric system will incorrectly reject an access attempt by an authorized user.






21. A set of hardware - software - people - policies - and procedures needed to create - manage - distribute - use - store - and revoke digital certificates.






22. A trusted entity that issues and revokes public key certificates. In a network - a CA is a trusted entity that issues - manages - and revokes security credentials and public keys for message encryption and/or authentication. Within a public key infra






23. A text file stored within a browser by a web server that maintains information about the connection. Cookies are used to store information to maintain a unique but consistent surfing experience - but can also contain authentication parameters. Cookie






24. Independent review and examination of records and activities to assess the adequacy of system controls - to ensure compliance with established policies and operational procedures - and to recommend necessary changes.






25. A self-replicating malicious program that attempts installation beneath antivirus software by directly intercepting the interrupt handlers of the operating system to evade detection.






26. A point-to-point connection between two endpoints created to exchangedata. Typically a tunnel is either an encrypted connection - or a connection using a protocol in a method for which it was not designed. An encrypted connection forms a point-to-poi






27. A TCP flag notifying an originating station that the preceding packet (or packets) has been received.






28. The act of searching for Wi-Fi wireless networks by a person in a moving vehicle - using a portable device.






29. A hacking method for stealing the cookies used during a session build and replaying them for unauthorized connection purposes.






30. Two or more LANs connected by a high-speed line across a large geographical area.






31. TCP SYN Scan






32. The ability to trace actions performed on a system to a specific user or system entity.






33. Hex 14






34. Port 80/81/8080






35. A documented process for a procedure designed to be consistent - repeatable - and accountable.






36. A network deployed as a trap to detect - deflect - or deter unauthorized use of information systems.






37. Text or data in its encrypted form; the result of plaintext being input into a cryptographic algorithm.






38. An agreement between the penetration tester and the client detailing the activities the tester is permitted to perform.






39. Sending packets or requests to another system to gain information to be used to identify weaknesses and protect the system from attacks.






40. A command used in HTTP and FTP to retrieve a file from a server.






41. Window Scan






42. A mode of operation for a block cipher - with the characteristic that each possible block of plaintext has a defined corresponding ciphertext value - and vice versa






43. The transmission of digital signals without precise clocking or synchronization.






44. In computer security - this is an algorithm that uses separate keys for encryption and decryption.






45. A set of related communications protocols operating together as a group to address communication at some or all of the seven layers of the OSI reference model.






46. A condition that occurs when more data is written to a buffer than it has space to store - and results in data corruption or other system errors. This is usually due to insufficient bounds checking - a bug - or improper configuration in the program c






47. The process of using easily accessible DNS records to map a target network's internal hosts.






48. Transmission using channels or frequencies outside those normally used for data transfer; often used for error reporting.






49. Software or firmware intended to perform an unauthorized process that will have an adverse impact on the confidentiality - integrity - or availability of an information system. A virus - worm - Trojan horse - or other code-based entity that infects a






50. Also known as a digital certificate - this is an electronic file used to verify a user's identity - providing non-repudiation throughout the system It is also a set of data that uniquely identifies an entity. Certificates contain the entity's public