Test your basic knowledge |

CEH: Certified Ethical Hacker

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A fully operational off-site data-processing facility equipped with hardware and system software to be used in the event of a disaster.






2. A self-replicating - self-propagating - self-contained program that uses networking mechanisms to spread itself.






3. A card with a built-in microprocessor and memory used for identification or financial transactions. The card transfers data to and from a central computer when inserted into a reader.






4. A mode of operation in a wireless LAN in which clients send data directly to one another without utilizing a wireless access point (WAP) - much like a point-to-point wired connection.






5. An application that monitors a computer or network to identify - and prevent - malware. AV is usually signature-based - and can take multiple actions on defined malware files/activity.






6. A set of related communications protocols operating together as a group to address communication at some or all of the seven layers of the OSI reference model.






7. The process of pinging each address within a subnet to map potential targets. Ping sweeps are unreliable and easily detectable - but very fast.






8. Two or more LANs connected by a high-speed line across a large geographical area.






9. An Application layer protocol for managing devices on an IP network.






10. Version Detection Scan






11. Sneaky scan timing






12. A denial-of-service technique that uses numerous hosts to perform the attack.






13. A free and popular version of the Unix operating system.






14. Phases of an attack






15. Security measures - such as a locked door - perimeter fence - or security guard - to prevent or deter physical access to a facility - resource - or information stored on physical media.






16. nmap






17. Provides data encryption for IEEE 802.11 wireless networks so data can only be decrypted by the intended recipients.






18. A domain composed of all the systems sharing any given physical transport media. Systems within a collision domain may collide with each other during the transmission of data. Collisions can be managed by CSMA/CD (collision detection) or CSMA/CA (col






19. The rate at which a biometric system will incorrectly reject an access attempt by an authorized user.






20. A point-to-point connection between two endpoints created to exchangedata. Typically a tunnel is either an encrypted connection - or a connection using a protocol in a method for which it was not designed. An encrypted connection forms a point-to-poi






21. A protocol defining packets that are able to be routed by a router.






22. A NAT method in which multiple internal hosts - using private IP addressing - can be mapped through a single public IP address using the session IDs and port numbers. An internal global IP address can support in excess of 65 -000 concurrent TCP and U






23. Attacks on the actual programming code of an application.






24. A principle in security engineering that attempts to use anonymity and secrecy (of design - implementation - and so on) to provide security; the footprint of the organization - entity - network - or system is kept as small as possible to avoid intere






25. A self-replicating malicious program that attempts installation beneath antivirus software by directly intercepting the interrupt handlers of the operating system to evade detection.






26. A VPN tunneling protocol with encryption. PPTP connects two nodes in a VPN by using one TCP port for negotiation and authentication and one IP protocol for data transfer.






27. A mode of operation for a block cipher - with the characteristic that each possible block of plaintext has a defined corresponding ciphertext value - and vice versa






28. An inspection of a place where a company or individual proposes to work - to gather the necessary information for a design or risk assessment.






29. Wireless LAN standards created by IEEE. 802.11a runs at up to 54Mbps at 5GHz - 802.11b runs at 11Mbps at 2.4GHz - 802.11g runs at 54Mbps at 2.4GHz - and 802.11n can run upwards of 150MBps.






30. A virus that plants itself in a system's boot sector and infects the master boot record.






31. The set of all hardware - firmware - and/or software components critical to IT security. Bugs or vulnerabilities occurring inside the TCB might jeopardize the security properties of the entire system.






32. Layer 2 of the OSI reference model. This layer provides reliable transit of data across a physical link. The Data Link layer is concerned with physical addressing - network topology - access to the network medium - error detection - sequential delive






33. An evaluation consisting of a document review - interviews - and demonstrations - as well as vulnerability scans and hands-on testing.






34. A communications protocol used for browsing the Internet.






35. Nmap normal output






36. Vulnerability Scanning






37. Steps taken to identify and limit risks to an acceptable or reasonable level of exposure.






38. A situation in which an IDS or other sensor triggers on an event as an intrusion attempt - when it was actually legitimate traffic.






39. Provides router-to-router or host-to-network connections over asynchronous and synchronous circuits.






40. A software program for remotely controlling a Microsoft Windows computer system over a network. Generally considered malware.






41. The process of using an application to remotely identify open ports on a system (for example - whether systems allow connections through those ports).






42. An API that provides services related to the OSI model's Session layer - allowing applications on separate computers to communicate over a LAN.






43. A query and response protocol widely used for querying databases that store the registered users or assignees of an Internet resource - such as a domain name - an IP address - or an autonomous system.






44. Software that has advertisements embedded within. Generally displays ads in the form of pop-ups.






45. Controls to detect anomalies or undesirable events occurring on a system.






46. A unit of information formatted according to specific protocols that allows precise transmittal of data from one network node to another. Also called a datagram or data packet - a packet contains a header (container) and a payload (contents). Any IP






47. An attacker who breaks into computer systems with malicious intent - without the owner's knowledge or permission.






48. A security protocol used in IEEE 802.11i to replace WEP without the requirement to replace legacy hardware.






49. Ping Scan






50. An authentication method on point-to-point links - using a three-way handshake and a mutually agreed-upon key.