Test your basic knowledge |

CEH: Certified Ethical Hacker

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. CAN-SPAM






2. A type of denial-of-service attack where a hacker sends thousands of SYN packets to the target with spoofed IP addresses.






3. A software license agreement; a contract between the 'licensor' and purchaser establishing the right to use the software.






4. ICMP Timestamp






5. Created by the U.S. Federal Communications Commission to uniquely identify mobile devices; often represented as an 11-digit decimal number or eight-digit hexadecimal number.






6. Traffic-passing technique used by bridges and switches in which traffic received on an interface is sent out all interfaces on the device except the interface on which the information was originally received. Traffic on a switch is flooded when it is






7. A device or service designed to obfuscate traffic between a client and the Internet. Generally used to make activity on the Internet as untraceable as possible.






8. TCP SYN Scan






9. A mode of operation in a wireless LAN in which clients send data directly to one another without utilizing a wireless access point (WAP) - much like a point-to-point wired connection.






10. Another term for firewalking






11. A programming principle whereby the last piece of data added to the stack is the first piece of data taken off.






12. An attack against an authentication protocol in which the attacker intercepts data in transit along the network between the claimant and verifier - but does not alter the data (in other words - eavesdropping).






13. A step-by-step method of solving a problem. In computing security - an algorithm is a set of mathematical rules (logic) for the process of encryption and decryption






14. The rate at which a biometric system will incorrectly identify an unauthorized individual and allow them access (see false negative).






15. A protocol for exchanging packets over a serial line.






16. Monitoring of telephone or Internet conversations - typically by covert means.






17. A distance-vector routing protocol that employs the hop count as a routing metric. The 'hold down time -' used to define how long a route is held in memory - is 180 seconds. RIP prevents routing loops by implementing a limit on the number of hops all






18. The condition of a resource being ready for use and accessible by authorized users.






19. The basis of this kind of security is that an individual user - or program operating on the user's behalf - is allowed to specify explicitly the types of access other users (or programs executing on their behalf) may have to information under the use






20. A standard for encrypting and authenticating MIME data; used primarily for Internet e-mail.






21. Literally - 'not balanced or the same.' In computing - asymmetric refers to a difference in networking speeds upstream to downstream. In cryptography - it's the use of more than one key for encryption/authentication purposes.






22. A virus written in a macro language and usually embedded in document or spreadsheet files.






23. A method of external testing whereby several systems or resources are used together to effect an attack.






24. Phases of an attack






25. A business - government agency - or educational institution that provides access to the Internet.






26. A function that is easy to compute in one direction - yet believed to be difficult to compute in the opposite direction (finding its inverse) without special information - called the 'trapdoor.' Widely used in cryptography.






27. The process of sending a packet or frame toward the destination. In a switch - messages are forwarded only to the port they are addressed to.






28. When an authorized person allows (intentionally or unintentionally) someone to pass through a secure door - despite the fact that the intruder does not have a badge.






29. A set of rules defined by a system administrator that indicates whether access is allowed or denied to resource objects.






30. A class of algorithms for cryptography that use the same cryptographic key for both decryption and encryption.






31. An Application layer protocol for managing devices on an IP network.






32. An Application layer protocol for sending electronic mail between servers.






33. A program or piece of code inserted into a system - usually covertly - with the intent of compromising the confidentiality - integrity - or availability of the victim's data - applications - or operating system. Malware consists of viruses - worms -






34. The act or actions of a hacker to put forward a cause or a political agenda - to affect some societal change - or to shed light on something he feels to be political injustice. These activities are usually illegal in nature.






35. UDP Scan






36. A mathematical operation requiring two binary inputs: If the inputs match - the output is a 0 - otherwise it is a 1.






37. A decision to reduce the potential for damage to or loss of an IT asset by taking some type of action






38. An attack in which the hacker can derive information from the ciphertext without actually decoding it. Sensitive information can be considered compromised if an adversary can infer its real value with a high level of confidence.






39. Port 135






40. A set of related communications protocols operating together as a group to address communication at some or all of the seven layers of the OSI reference model.






41. A fully operational off-site data-processing facility equipped with hardware and system software to be used in the event of a disaster.






42. Metamorphic Virus






43. The potential for damage to or loss of an IT asset






44. Steps taken to identify and limit risks to an acceptable or reasonable level of exposure.






45. A method used to prevent IDS detection by dividing the request into multiple parts that are sent in different packets






46. A method of network traffic filtering that monitors the entire communications process - including the originator of the session and from which direction it started.






47. A communications protocol used for browsing the Internet.






48. The set of all hardware - firmware - and/or software components critical to IT security. Bugs or vulnerabilities occurring inside the TCB might jeopardize the security properties of the entire system.






49. A symmetric key cryptographic algorithm that transforms a block of information at a time using a cryptographic key. For a block cipher algorithm - the length of the input block is the same as the length of the output block.






50. Software or hardware components that restrict access between a protected network and the Internet - or between other sets of networks - to block unwanted use or attacks.