Test your basic knowledge |

CEH: Certified Ethical Hacker

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A communications channel that is being used for a purpose it was not intended for - usually to transfer information secretly.






2. Malware designed to install some sort of virus - backdoor - and so on - on a target system.






3. An attack where the hacker manipulates parameters within the URL string in hopes of modifying data.






4. An international encoding standard - working within multiple languages and scripts - that represents each letter - digit - or symbol with a unique numeric value that applies across different platforms.






5. A skilled hacker that straddles the line between white hat (hacking only with permission and within guidelines) and black hat (malicious hacking for personal gain). Gray hats sometime perform illegal acts to exploit technology with the intent of achi






6. A type of DNS transfer - where all records from an SOA are transmitted to the requestor. Zone transfers have two options: full (opcode AXFR) and incremental (IXFR).






7. Port 80/81/8080






8. A network traffic management technique designed to allow applications to specify the route a packet will take to a destination - regardless of what the route tables between the two systems say.






9. A list of IP addresses and corresponding MAC addresses stored on a local computer.






10. A means of restricting access to system resources based on the sensitivity (as represented by a label) of the information contained in the system resource and the formal authorization (that is - clearance) of users to access information of such sensi






11. A technology that establishes a tunnel to create a private - dedicated - leased-line network over the Internet. The data is encrypted so it's readable only by the sender and receiver. Companies commonly use VPNs to allow employees to connect securely






12. A communications protocol used for browsing the Internet.






13. A unit of information formatted according to specific protocols that allows precise transmittal of data from one network node to another. Also called a datagram or data packet - a packet contains a header (container) and a payload (contents). Any IP






14. A step-by-step method of solving a problem. In computing security - an algorithm is a set of mathematical rules (logic) for the process of encryption and decryption






15. Phases of an attack






16. A non-self-replicating program that appears to have a useful purpose - but in reality has a different - malicious purpose.






17. Port 161/162






18. A penetration test in which the ethical hacker has limited knowledge of the intended target(s). Designed to simulate an internal - but non-systemadministrator-level attack.






19. An Application layer protocol - using TCP - for transporting files across an Internet connection. FTP transmits in clear text.






20. A hacker who aims to bring down critical infrastructure for a 'cause' and does not worry about the penalties associated with his actions.






21. Used for exchanging structured information - such as XML-based messages - in the implementation of web services






22. A query and response protocol widely used for querying databases that store the registered users or assignees of an Internet resource - such as a domain name - an IP address - or an autonomous system.






23. An Application layer protocol for managing devices on an IP network.






24. A defined measure of service within a network system






25. Hashing algorithm that results in a 128-bit output.






26. An application that monitors a computer or network to identify - and prevent - malware. AV is usually signature-based - and can take multiple actions on defined malware files/activity.






27. Whether purposeful or the result of malware or other attack - a backdoor is a hidden capability in a system or program for bypassing normal computer authentication systems.






28. A denial-of-service technique that uses numerous hosts to perform the attack.






29. The process of using easily accessible DNS records to map a target network's internal hosts.






30. ICMP Type/Code 3






31. A Windows-based GUI version of nmap.






32. A computer process that requests a service from another computer and accepts the server's responses.






33. An attack that combines a brute-force attack with a dictionary attack.






34. A system used by the Securities and Exchange Commission (SEC) for companies and businesses to transmit required filings and information. The EDGAR database performs automated collection - validation - indexing - acceptance - and forwarding of submiss






35. A stand-alone computer - kept off the network - that is used for scanning potentially malicious media or software.






36. An information assurance strategy in which multiple layers of defense are placed throughout an Information Technology system.






37. A self-replicating - self-propagating - self-contained program that uses networking mechanisms to spread itself.






38. Physical socket provided on routers and switches for cable connections between a computer and the router/switch. This connection enables the computer to configure - query - and troubleshoot the router/switch by use of a terminal emulator and a comman






39. A NAT method in which multiple internal hosts - using private IP addressing - can be mapped through a single public IP address using the session IDs and port numbers. An internal global IP address can support in excess of 65 -000 concurrent TCP and U






40. A cyber attacker who acts without permission from - and gives prior notice to - the resource owner. Also known as a malicious hacker.






41. A device providing temporary - on-demand - point-to-point network access to users.






42. A simple PPP authentication mechanism in which the user name and password are transmitted in clear text to prove identity. PAP compares the user name and password to a table listing authorized users.






43. Two or more LANs connected by a high-speed line across a large geographical area.






44. The monetary value expected from the occurrence of a risk on an asset. It is mathematically expressed as single loss expectancy (SLE) = asset value (AV)






45. A free - open source version of the Berkeley Software Distribution of Unix - often used in embedded systems.






46. The basis of this kind of security is that an individual user - or program operating on the user's behalf - is allowed to specify explicitly the types of access other users (or programs executing on their behalf) may have to information under the use






47. A string used for authentication in SNMP. The public community string is used for read-only searches - whereas the private community string is used for read/write. Community strings are transmitted in clear text in SNMPv1. SNMPv3 provides encryption






48. An unknown deficiency in software or some other product that results in a security vulnerability being identified.






49. A standard developed to enable routers to exchange messages containing information about routes to reach subnets in the network.






50. The organization that governs the Internet's top-level domains - IP address allocation - and port number assignments.