Test your basic knowledge |

CEH: Certified Ethical Hacker

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. An attack in which a hacker steps between two ends of an already-established communication session and uses specialized tools to guess sequence numbers to take over the channel.






2. A TCP flag notifying an originating station that the preceding packet (or packets) has been received.






3. A string that represents the location of a web resource






4. An attack where the hacker repeats a portion of a cryptographic exchange in hopes of fooling the system into setting up a communications channel.






5. Transmitting one protocol encapsulated inside another protocol.






6. An attack that is direct in nature - usually where the attacker injects something into - or otherwise alters - the network or system target.






7. A free and popular version of the Unix operating system.






8. A function that is easy to compute in one direction - yet believed to be difficult to compute in the opposite direction (finding its inverse) without special information - called the 'trapdoor.' Widely used in cryptography.






9. A proprietary - open - wireless technology used for transferring data from fixed and mobile devices over short distances.






10. Normal scan timing






11. A formal set of rules describing data transmission - especially across a network. A protocol determines the type of error checking - the data compression method - how the sending device will indicate completion - how the receiving device will indicat






12. A small space having two sets of interlocking doors; the first set of doors must close before the second set opens. Typically authentication is required for each door - often using different factors. For example - a smart card may open the first door






13. The organization that governs the Internet's top-level domains - IP address allocation - and port number assignments.






14. An industry standard protocol used for accessing and managing information within a directory service; an application protocol for querying and modifying data using directory services running over TCP/IP.






15. nmap






16. A symmetric key cipher where plaintext bits are combined with a pseudo-random cipher bit stream (keystream) - typically by an exclusive-or (XOR) operation. In a stream cipher the plaintext digits are encrypted one at a time - and the transformation o






17. The directory service created by Microsoft for use on itsnetworks. Provides a variety of network services using Lightweight Directory Access Protocol (LDAP) - Kerberos-based authentication - and single sign-on for user access to network-based resourc






18. A standard that provides best-practice recommendations on information security management for use by those responsible for initiating - implementing - or maintaining Information Security Management Systems (ISMS). Information security is defined with






19. A skilled hacker that straddles the line between white hat (hacking only with permission and within guidelines) and black hat (malicious hacking for personal gain). Gray hats sometime perform illegal acts to exploit technology with the intent of achi






20. A type of malware that covertly collects information about a user.






21. Incremental Substitution






22. Drawing symbols in public places to alert others to an open Wi-Fi network. War chalking can include the SSIDs - administrative passwords to APs - and other information.






23. A self-replicating malicious program that attempts installation beneath antivirus software by directly intercepting the interrupt handlers of the operating system to evade detection.






24. Sending packets or requests to another system to gain information to be used to identify weaknesses and protect the system from attacks.






25. A group of people - gathered together by a business entity - working to address a specific problem or goal.






26. A program designed to execute at a specific time to release malicious code onto the computer system or network.






27. Looking over an authorized user's shoulder in order to steal information (such as authentication information).






28. A sublayer of layer 2 of the OSI model - the Data Link layer. It provides addressing and channel access control mechanisms that enable several terminals or network nodes to communicate within a multipoint network.






29. nmap






30. The Security Accounts Manager file in Windows stores all the password hashes for the system.






31. The means by which a recipient of a message can ensure the identity of the sender and that neither party can deny having sent or received the message. The most common method is through digital certificates.






32. Cracking Tools






33. The cyclical practice of identifying - classifying - remediating - and mitigating vulnerabilities.






34. A free - open source version of the Berkeley Software Distribution of Unix - often used in embedded systems.






35. The exploitation of a security vulnerability






36. A piece of code intentionally inserted into a software system that will perform a malicious function when specified conditions are met at some future point.






37. White hat






38. An evaluation consisting of a document review - interviews - and demonstrations. No hands-on testing is performed.






39. Provides data encryption for IEEE 802.11 wireless networks so data can only be decrypted by the intended recipients.






40. Unauthorized access to information such as a calendar - contact list - e-mails - and text messages on a wireless device through a Bluetooth connection.






41. Originally an extension of PPP - this is a protocol for authentication used within wireless networks. Works with multiple authentication measures.






42. A symmetric key cryptographic algorithm that transforms a block of information at a time using a cryptographic key. For a block cipher algorithm - the length of the input block is the same as the length of the output block.






43. The process of sending a packet or frame toward the destination. In a switch - messages are forwarded only to the port they are addressed to.






44. The act of dialing all numbers within an organization to discover open modems.






45. The process of a system providing a fully qualified domain name (FQDN) to a local name server - for resolution to its corresponding IP address.






46. A partially protected zone on a network - not exposed to the full fury of the Internet - but not fully behind the firewall. This technique is typically used on parts of the network that must remain open to the public (such as a web server) but must a






47. The secret portion of an asymmetric key pair typically used to decrypt or digitally sign data. The private key is never shared and is always used for decryption - with one notable exception: The private key is used to encrypt the digital signature.






48. A method of password cracking whereby all possible options are systematically enumerated until a match is found. These attacks try every password (or authentication option) - one after another - until successful. Bruteforce attacks take a long time t






49. The process of determining if a network entity (user or service) is legitimate






50. The monetary value expected from the occurrence of a risk on an asset. It is mathematically expressed as single loss expectancy (SLE) = asset value (AV)