Test your basic knowledge |

CEH: Certified Ethical Hacker

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. ICMP Type/Code 0-0






2. A type of denial-of-service attack where a hacker sends thousands of SYN packets to the target with spoofed IP addresses.






3. Text or data in its encrypted form; the result of plaintext being input into a cryptographic algorithm.






4. A unique hostname that is used to identify resources on the Internet. Domain names start with a root (.) - then add a top level (.com - .gov - or .mil - for example) - and a given name space.






5. A technology that establishes a tunnel to create a private - dedicated - leased-line network over the Internet. The data is encrypted so it's readable only by the sender and receiver. Companies commonly use VPNs to allow employees to connect securely






6. Layer 2 of the OSI reference model. This layer provides reliable transit of data across a physical link. The Data Link layer is concerned with physical addressing - network topology - access to the network medium - error detection - sequential delive






7. The rate at which a biometric system will incorrectly reject an access attempt by an authorized user.






8. The lack of clocking (imposed time ordering) on a bit stream.






9. A person or entity indirectly involved in a relationship between two principles.






10. A point-to-point connection between two endpoints created to exchangedata. Typically a tunnel is either an encrypted connection - or a connection using a protocol in a method for which it was not designed. An encrypted connection forms a point-to-poi






11. Used to find the domain name associated with an IP address; the opposite of a DNS lookup.






12. Vulnerability Scanning






13. A small Trojan program that listens on port 777.






14. A network deployed as a trap to detect - deflect - or deter unauthorized use of information systems.






15. Provides data encryption for IEEE 802.11 wireless networks so data can only be decrypted by the intended recipients.






16. A unit of information formatted according to specific protocols that allows precise transmittal of data from one network node to another. Also called a datagram or data packet - a packet contains a header (container) and a payload (contents). Any IP






17. A computer system that performs tasks dictated by an attacker from a remote location. Zombies may be active or idle - and owners of the systems generally do not know their systems are compromised.






18. The security property that data is not modified in an unauthorized and undetected manner. Also - the principle and measures taken to ensure that data received is in the exact same condition and state as when it was originally transmitted.






19. An attacker who breaks into computer systems with malicious intent - without the owner's knowledge or permission.






20. nmap






21. Normal scan timing






22. A programming principle whereby the last piece of data added to the stack is the first piece of data taken off.






23. A wireless LAN security standard developed by IEEE. Requires Temporal Key Integrity Protocol (TKIP) and Advanced Encryption Standard (AES).






24. An Application layer protocol for managing devices on an IP network.






25. A unique numerical string - created by a hashing algorithm on a given piece of data - used to verify data integrity. Generally hashes are used to verify the integrity of files after download (comparison to the hash value on the site before download)






26. A command used in HTTP and FTP to retrieve a file from a server.






27. An Application layer protocol used by local email clients to retrieve e-mail from a remote server over a TCP/IP connection.






28. An HTTP command to transmit text to a web server for processing. The opposite of an HTTP GET.






29. The process of pinging each address within a subnet to map potential targets. Ping sweeps are unreliable and easily detectable - but very fast.






30. The default network authentication suite of protocols for Windows NT 4.0






31. The act of secretly listening to the private conversations of others without their consent. This can also be done over telephone lines (wiretapping) - e-mail - instant messaging - and other methods of communication considered private






32. ACK Scan






33. A security objective that ensures a resource can be accessed only by authorized users. This is also the property that sensitive information is not disclosed to unauthorized individuals - entities - or processes.






34. A string used for authentication in SNMP. The public community string is used for read-only searches - whereas the private community string is used for read/write. Community strings are transmitted in clear text in SNMPv1. SNMPv3 provides encryption






35. Software or firmware intended to perform an unauthorized process that will have an adverse impact on the confidentiality - integrity - or availability of an information system. A virus - worm - Trojan horse - or other code-based entity that infects a






36. Software that has advertisements embedded within. Generally displays ads in the form of pop-ups.






37. A computer placed outside a firewall to provide public services to other Internet sites - and hardened to resist external attacks.






38. The conveying of official access or legal power to a person or entity.






39. A step-by-step method of solving a problem. In computing security - an algorithm is a set of mathematical rules (logic) for the process of encryption and decryption






40. Independent review and examination of records and activities to assess the adequacy of system controls - to ensure compliance with established policies and operational procedures - and to recommend necessary changes.






41. A type of encryption where the same key is used to encrypt and decrypt the message.






42. A virus designed to infect the master boot record.






43. Software code - a portion of data - or sequence of commands intended to take advantage of a bug or vulnerability in order to cause unintended or unanticipated behavior to occur on computer software or hardware.






44. An attack with the goal of preventing authorized users from accessing services and preventing the normal operation of computers and networks.






45. A computer file system architecture used in Windows - OS/2 - and most memory cards.






46. nmap all output






47. The organization that governs the Internet's top-level domains - IP address allocation - and port number assignments.






48. Layer 6 of the OSI reference model. The Presentation layer ensures information sent by the Application layer of the sending system will be readable by the Application layer of the receiving system.






49. Formerly Redundant Array of Inexpensive Disks; a technology that provides increased storage functions and reliability through redundancy. This is achieved by combining multiple disk drive components into a logical unit - where data is distributed acr






50. A set of exclusive rights granted by the law of a jurisdiction to the author or creator of an original work - including the right to copy - distribute - and adapt the work.