Test your basic knowledge |

CEH: Certified Ethical Hacker

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A symmetric key cryptographic algorithm that transforms a block of information at a time using a cryptographic key. For a block cipher algorithm - the length of the input block is the same as the length of the output block.






2. Hex 29






3. The means by which a recipient of a message can ensure the identity of the sender and that neither party can deny having sent or received the message. The most common method is through digital certificates.






4. Two or more LANs connected by a high-speed line across a large geographical area.






5. A trusted entity that issues and revokes public key certificates. In a network - a CA is a trusted entity that issues - manages - and revokes security credentials and public keys for message encryption and/or authentication. Within a public key infra






6. The act of searching for Wi-Fi wireless networks by a person in a moving vehicle - using a portable device.






7. A NAT method in which multiple internal hosts - using private IP addressing - can be mapped through a single public IP address using the session IDs and port numbers. An internal global IP address can support in excess of 65 -000 concurrent TCP and U






8. When an authorized person allows (intentionally or unintentionally) someone to pass through a secure door - despite the fact that the intruder does not have a badge.






9. In computer security - this is an algorithm that uses separate keys for encryption and decryption.






10. A technology that establishes a tunnel to create a private - dedicated - leased-line network over the Internet. The data is encrypted so it's readable only by the sender and receiver. Companies commonly use VPNs to allow employees to connect securely






11. Phases of an attack






12. A device that provides access between two or more networks. Gateways are typically used to connect dissimilar networks.






13. The change or growth of a project's scope






14. A simple PPP authentication mechanism in which the user name and password are transmitted in clear text to prove identity. PAP compares the user name and password to a table listing authorized users.






15. A point-to-point connection between two endpoints created to exchangedata. Typically a tunnel is either an encrypted connection - or a connection using a protocol in a method for which it was not designed. An encrypted connection forms a point-to-poi






16. A sublayer of layer 2 of the OSI model - the Data Link layer. It provides addressing and channel access control mechanisms that enable several terminals or network nodes to communicate within a multipoint network.






17. A piece of software - provided by the vendor - intended to update or fix known - discovered problems in a computer program or its supporting data.






18. A card with a built-in microprocessor and memory used for identification or financial transactions. The card transfers data to and from a central computer when inserted into a reader.






19. The secret portion of an asymmetric key pair typically used to decrypt or digitally sign data. The private key is never shared and is always used for decryption - with one notable exception: The private key is used to encrypt the digital signature.






20. An approach to restricting system access to authorized users in which roles are created for various job functions. The permissions to perform certain operations are assigned to specific roles. Members of staff (or other system users) are assigned par






21. Formerly Redundant Array of Inexpensive Disks; a technology that provides increased storage functions and reliability through redundancy. This is achieved by combining multiple disk drive components into a logical unit - where data is distributed acr






22. A documented process for a procedure designed to be consistent - repeatable - and accountable.






23. The central part of a computer or communications system hardware firmware - and software that implements the basic security procedures for controlling access to system resources.






24. Sending packets or requests to another system to gain information to be used to identify weaknesses and protect the system from attacks.






25. Idlescan






26. In penetration testing - this is a method of testing the security of a system or subnet without any previous knowledge of the device or network. Designed to simulate an attack by an outside intruder (usually from the Internet).






27. A security tool designed to protect a system or network against attacks by comparing traffic patterns against a list of both known attack signatures and general characteristics of how attacks may be carried out. Threats are rated and reported.






28. A hybrid of the HTTP and SSL/TLS protocols that provides encrypted communication and secure identification of a web server.






29. A condition that occurs when more data is written to a buffer than it has space to store - and results in data corruption or other system errors. This is usually due to insufficient bounds checking - a bug - or improper configuration in the program c






30. The act of using numerous electronic serial numbers on a cell phone until a valid number is located.






31. The process of systematically testing each port on a firewall to map rules and determine accessible ports.






32. A method of permitting only MAC addresses in a preapproved list network access. Addresses not matching are blocked.






33. Part of a service contract where the level of service is formally defined; may be required as part of the initial pen test agreements.






34. Used for exchanging structured information - such as XML-based messages - in the implementation of web services






35. An Ethernet networking system transmitting data at 100 million bits per second (Mbps) - 10 times the speed of an earlier Ethernet standard. Derived from the Ethernet 802.3 standard - it is also known as 100BaseT.






36. A software or hardware application or device that captures user keystrokes.






37. A social-engineering effort in which the attacker pretends to be an employee - a valid user - or even an executive to elicit information or access.






38. A symmetric - block-cipher data-encryption standard that uses a variablelength key that can range from 32 bits to 448 bits.






39. An attack in which the hacker can derive information from the ciphertext without actually decoding it. Sensitive information can be considered compromised if an adversary can infer its real value with a high level of confidence.






40. A protocol used for sending and receiving log information for nodes on a network.






41. A computer placed outside a firewall to provide public services to other Internet sites - and hardened to resist external attacks.






42. An evaluation consisting of a document review - interviews - and demonstrations. No hands-on testing is performed.






43. The process of determining if a network entity (user or service) is legitimate






44. A VPN tunneling protocol with encryption. PPTP connects two nodes in a VPN by using one TCP port for negotiation and authentication and one IP protocol for data transfer.






45. The rate at which a biometric system will incorrectly reject an access attempt by an authorized user.






46. A method of password cracking whereby all possible options are systematically enumerated until a match is found. These attacks try every password (or authentication option) - one after another - until successful. Bruteforce attacks take a long time t






47. Literally - 'not balanced or the same.' In computing - asymmetric refers to a difference in networking speeds upstream to downstream. In cryptography - it's the use of more than one key for encryption/authentication purposes.






48. A type of denial-of-service attack where a hacker sends thousands of SYN packets to the target with spoofed IP addresses.






49. List Scan






50. A backup facility with the electrical and physical components of a computer facility - but with no computer equipment in place. The site is ready to receive the necessary replacement computer equipment in the event the user has to move from his main