Test your basic knowledge |

CEH: Certified Ethical Hacker

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A protocol for transporting data packets across a packet switched internetwork (such as the Internet). IP is a routed protocol.






2. A unique hostname that is used to identify resources on the Internet. Domain names start with a root (.) - then add a top level (.com - .gov - or .mil - for example) - and a given name space.






3. A program designed to execute at a specific time to release malicious code onto the computer system or network.






4. The transmission of digital signals without precise clocking or synchronization.






5. A query and response protocol widely used for querying databases that store the registered users or assignees of an Internet resource - such as a domain name - an IP address - or an autonomous system.






6. Using conversation or some other interaction between people to gather useful information.






7. A hybrid of the HTTP and SSL/TLS protocols that provides encrypted communication and secure identification of a web server.






8. A point-to-point connection between two endpoints created to exchangedata. Typically a tunnel is either an encrypted connection - or a connection using a protocol in a method for which it was not designed. An encrypted connection forms a point-to-poi






9. A record showing which user has accessed a given resource and what operations the user performed during a given period.






10. A device providing temporary - on-demand - point-to-point network access to users.






11. An attack in which the hacker can derive information from the ciphertext without actually decoding it. Sensitive information can be considered compromised if an adversary can infer its real value with a high level of confidence.






12. Devices - connected to one or more switches - grouped logically into a single broadcast domain. VLANs enable administrators to divide the devices connected to the switches into multiple VLANs without requiring separate physical switches.






13. Start of Authority record. This record identifies the primary name server for the zone. The SOA record contains the host name of the server responsible for all DNS records within the namespace - as well as the basic properties of the domain.






14. Also known as the dot-dot-slash attack. Using directory traversal - the attacker attempts to access restricted directories and execute commands outside intended web server directories by using the URL to redirect to an unintended folder location.






15. A virus designed to infect the master boot record.






16. A wireless LAN security standard developed by IEEE. Requires Temporal Key Integrity Protocol (TKIP) and Advanced Encryption Standard (AES).






17. An evaluation consisting of a document review - interviews - and demonstrations - as well as vulnerability scans and hands-on testing.






18. Software or hardware components that restrict access between a protected network and the Internet - or between other sets of networks - to block unwanted use or attacks.






19. Confidentiality - Integrity - and Availability are the three aspects of security and make up the triangle.






20. RPC Scan






21. Port 80/81/8080






22. A standard for encrypting e-mail - web pages - and other stream-oriented information transmitted over the Internet.






23. The process of systematically testing each port on a firewall to map rules and determine accessible ports.






24. Chronological record of system activities to enable the reconstruction and examination of the sequence of events and changes in an event.






25. A type of DNS transfer - where all records from an SOA are transmitted to the requestor. Zone transfers have two options: full (opcode AXFR) and incremental (IXFR).






26. Paranoid scan timing






27. A self-replicating - self-propagating - self-contained program that uses networking mechanisms to spread itself.






28. Traffic-passing technique used by bridges and switches in which traffic received on an interface is sent out all interfaces on the device except the interface on which the information was originally received. Traffic on a switch is flooded when it is






29. A program or piece of code inserted into a system - usually covertly - with the intent of compromising the confidentiality - integrity - or availability of the victim's data - applications - or operating system. Malware consists of viruses - worms -






30. An HTTP command to transmit text to a web server for processing. The opposite of an HTTP GET.






31. A computer virus that infects and spreads in multiple ways.






32. A formal set of rules describing data transmission - especially across a network. A protocol determines the type of error checking - the data compression method - how the sending device will indicate completion - how the receiving device will indicat






33. A method of defining what rights and permissions an entity has to a given resource. In networking - Access Control Lists are commonly associated with firewall and router traffic filtering rules.






34. A computer network confined to a relatively small area - such as a single building or campus - in which devices connect through high-frequency radio waves using IEEE standard 802.11.






35. A protocol defining packets that are able to be routed by a router.






36. The conveying of official access or legal power to a person or entity.






37. An organization composed of engineers - scientists - and students who issue standards related to electrical - electronic - and computer engineering.






38. The monetary loss that can be expected for an asset due to risk over a one-year period. ALE is the product of the annual rate of occurrence (ARO) and the single loss expectancy (SLE). It is mathematically expressed as ALE = ARO






39. A method in cryptography by which cryptographic keys are exchanged between users - allowing use of a cryptographic algorithm (for example - the Diffie-Hellman key exchange).






40. A computer file system architecture used in Windows - OS/2 - and most memory cards.






41. Two or more LANs connected by a high-speed line across a large geographical area.






42. Xmas Tree scan






43. A tool that helps a company to compare its actual performance with its potential performance.






44. Weakness in an information system - system security procedures - internal controls - or implementation that could be exploited or triggered by a threat source.






45. The art and science of creating a covert message or image within another message - image - audio - or video file.






46. A defined measure of service within a network system






47. A text file stored within a browser by a web server that maintains information about the connection. Cookies are used to store information to maintain a unique but consistent surfing experience - but can also contain authentication parameters. Cookie






48. A security objective that ensures a resource can be accessed only by authorized users. This is also the property that sensitive information is not disclosed to unauthorized individuals - entities - or processes.






49. Whether purposeful or the result of malware or other attack - a backdoor is a hidden capability in a system or program for bypassing normal computer authentication systems.






50. The secret portion of an asymmetric key pair typically used to decrypt or digitally sign data. The private key is never shared and is always used for decryption - with one notable exception: The private key is used to encrypt the digital signature.