Test your basic knowledge |

CEH: Certified Ethical Hacker

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Any network incident that prompts some kind of log entry or other notification.






2. An anonymous connection to an administrative share (IPC$) on a Windows machine. Null sessions allow for enumeration of Windows machines - among other attacks.






3. Drawing symbols in public places to alert others to an open Wi-Fi network. War chalking can include the SSIDs - administrative passwords to APs - and other information.






4. The combination of all IT assets - resources - components - and systems.






5. The process of sending a packet or frame toward the destination. In a switch - messages are forwarded only to the port they are addressed to.






6. The process of a system providing a fully qualified domain name (FQDN) to a local name server - for resolution to its corresponding IP address.






7. A string used for authentication in SNMP. The public community string is used for read-only searches - whereas the private community string is used for read/write. Community strings are transmitted in clear text in SNMPv1. SNMPv3 provides encryption






8. A protocol defining packets that are able to be routed by a router.






9. A suite of protocols used for securing Internet Protocol (IP) communications by authenticating and encrypting each IP packet of a communication session. This suite includes protocols for establishing mutual authentication between agents at the sessio






10. Security measures - such as a locked door - perimeter fence - or security guard - to prevent or deter physical access to a facility - resource - or information stored on physical media.






11. A standard that provides best-practice recommendations on information security management for use by those responsible for initiating - implementing - or maintaining Information Security Management Systems (ISMS). Information security is defined with






12. An application that monitors a computer or network to identify - and prevent - malware. AV is usually signature-based - and can take multiple actions on defined malware files/activity.






13. A nonroutable IP address range intended for use only within the confines of a single organization - falling within the predefined ranges of 10.0.0.0 - 172.16-31.0.0 - or 192.168.0.0.






14. A mode of operation in a wireless LAN in which clients send data directly to one another without utilizing a wireless access point (WAP) - much like a point-to-point wired connection.






15. Polymorphic Virus






16. Originally an extension of PPP - this is a protocol for authentication used within wireless networks. Works with multiple authentication measures.






17. A set of related communications protocols operating together as a group to address communication at some or all of the seven layers of the OSI reference model.






18. The directory service created by Microsoft for use on itsnetworks. Provides a variety of network services using Lightweight Directory Access Protocol (LDAP) - Kerberos-based authentication - and single sign-on for user access to network-based resourc






19. A routing protocol developed to be used within a single organization.






20. A security protocol used in IEEE 802.11i to replace WEP without the requirement to replace legacy hardware.






21. A condition that occurs when more data is written to a buffer than it has space to store - and results in data corruption or other system errors. This is usually due to insufficient bounds checking - a bug - or improper configuration in the program c






22. Software code - a portion of data - or sequence of commands intended to take advantage of a bug or vulnerability in order to cause unintended or unanticipated behavior to occur on computer software or hardware.






23. A firewall evasion technique whereby packets are wrapped in HTTP - as a covert channel to the target.






24. A small space having two sets of interlocking doors; the first set of doors must close before the second set opens. Typically authentication is required for each door - often using different factors. For example - a smart card may open the first door






25. An attack in which a hacker steps between two ends of an already-established communication session and uses specialized tools to guess sequence numbers to take over the channel.






26. A value used to control cryptographic operations - such as decryption -encryption - signature generation - and signature verification.






27. Name given to expert groups that handle computer security incidents.






28. A text file stored within a browser by a web server that maintains information about the connection. Cookies are used to store information to maintain a unique but consistent surfing experience - but can also contain authentication parameters. Cookie






29. don't ping






30. Hex 29






31. 18 U.S.C. 1030






32. A group of people - gathered together by a business entity - working to address a specific problem or goal.






33. ICMP Type/Code 0-0






34. A type of malware that covertly collects information about a user.






35. An attack that combines a brute-force attack with a dictionary attack.






36. A number assigned during TCP startup sessions that tracks how much information has been moved. This number is used by hackers when hijacking sessions.






37. A query and response protocol widely used for querying databases that store the registered users or assignees of an Internet resource - such as a domain name - an IP address - or an autonomous system.






38. A set of rules defined to screen network packets based on source address - destination address - or protocol; these rules determine whether the packet will be forwarded or discarded.






39. Port 110






40. Hex 10






41. A stand-alone computer - kept off the network - that is used for scanning potentially malicious media or software.






42. The cyclical practice of identifying - classifying - remediating - and mitigating vulnerabilities.






43. A non-self-replicating program that appears to have a useful purpose - but in reality has a different - malicious purpose.






44. A partially protected zone on a network - not exposed to the full fury of the Internet - but not fully behind the firewall. This technique is typically used on parts of the network that must remain open to the public (such as a web server) but must a






45. A business - government agency - or educational institution that provides access to the Internet.






46. As an identification device becomes more sensitive or accurate - its FAR decreases while its FRR increases. The CER is the point at which these two rates are equal - or cross over.






47. A social-engineering attack using computer resources - such as e-mail or IRC.






48. A software or hardware defect that often results in system vulnerabilities.






49. Activities to determine the extent to which a security control is implemented correctly - operating as intended - and producing the desired outcome with respect to meeting the security requirements for the system.






50. A Canonical Name record within DNS - used to provide an alias for a domain name.