Test your basic knowledge |

CEH: Certified Ethical Hacker

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A method of evaluating the security of a computer system or network by simulating an attack from a malicious source.






2. A remote control program in which the client runs on a local computer and connects to a remote server on a network. Commands entered locally are executed on the remote system.






3. Injecting traffic into the network to identify the operating system of a device.






4. The rate at which a biometric system will incorrectly identify an unauthorized individual and allow them access (see false negative).






5. A VPN tunneling protocol with encryption. PPTP connects two nodes in a VPN by using one TCP port for negotiation and authentication and one IP protocol for data transfer.






6. A technology that establishes a tunnel to create a private - dedicated - leased-line network over the Internet. The data is encrypted so it's readable only by the sender and receiver. Companies commonly use VPNs to allow employees to connect securely






7. A network deployed as a trap to detect - deflect - or deter unauthorized use of information systems.






8. A group of experts that handles computer security incidents.






9. Controlling access to a network by analyzing the headers of incoming and outgoing packets - and letting them pass or discarding them based on rule sets created by a network administrator. A packet filter allows or denies packets based on destination






10. The lack of clocking (imposed time ordering) on a bit stream.






11. The Security Accounts Manager file in Windows stores all the password hashes for the system.






12. An Ethernet networking system transmitting data at 100 million bits per second (Mbps) - 10 times the speed of an earlier Ethernet standard. Derived from the Ethernet 802.3 standard - it is also known as 100BaseT.






13. Evaluation in which testers attempt to penetrate the network.






14. A protocol used to pass control and error messages between nodes on the Internet.






15. A self-replicating malicious program that attempts installation beneath antivirus software by directly intercepting the interrupt handlers of the operating system to evade detection.






16. A formal set of rules describing data transmission - especially across a network. A protocol determines the type of error checking - the data compression method - how the sending device will indicate completion - how the receiving device will indicat






17. The process of sending a packet or frame toward the destination. In a switch - messages are forwarded only to the port they are addressed to.






18. An outdated symmetric cipher encryption algorithm - previously U.S. government-approved and used by business and civilian government agencies. DES is no longer considered secure due to the ease with which the entire keyspace can be attempted using mo






19. A suite of protocols used for securing Internet Protocol (IP) communications by authenticating and encrypting each IP packet of a communication session. This suite includes protocols for establishing mutual authentication between agents at the sessio






20. Actions - devices - procedures - techniques - or other measures intended to reduce the vulnerability of an information system.






21. The act of using numerous electronic serial numbers on a cell phone until a valid number is located.






22. A condition that occurs when more data is written to a buffer than it has space to store - and results in data corruption or other system errors. This is usually due to insufficient bounds checking - a bug - or improper configuration in the program c






23. A domain composed of all the systems sharing any given physical transport media. Systems within a collision domain may collide with each other during the transmission of data. Collisions can be managed by CSMA/CD (collision detection) or CSMA/CA (col






24. Port 80/81/8080






25. The basis of this kind of security is that an individual user - or program operating on the user's behalf - is allowed to specify explicitly the types of access other users (or programs executing on their behalf) may have to information under the use






26. A number assigned during TCP startup sessions that tracks how much information has been moved. This number is used by hackers when hijacking sessions.






27. A Windows-based GUI version of nmap.






28. Using conversation or some other interaction between people to gather useful information.






29. TCP connect() scan






30. A trusted entity that issues and revokes public key certificates. In a network - a CA is a trusted entity that issues - manages - and revokes security credentials and public keys for message encryption and/or authentication. Within a public key infra






31. A fully operational off-site data-processing facility equipped with hardware and system software to be used in the event of a disaster.






32. A simple PPP authentication mechanism in which the user name and password are transmitted in clear text to prove identity. PAP compares the user name and password to a table listing authorized users.






33. A means of restricting access to system resources based on the sensitivity (as represented by a label) of the information contained in the system resource and the formal authorization (that is - clearance) of users to access information of such sensi






34. A stand-alone computer - kept off the network - that is used for scanning potentially malicious media or software.






35. A means of exchanging information from one entity to another using a process that does not provide an attacker the opportunity to reorder - delete - insert - or read information.






36. Transmitting one protocol encapsulated inside another protocol.






37. An attack with the goal of preventing authorized users from accessing services and preventing the normal operation of computers and networks.






38. Port 22






39. A computer placed outside a firewall to provide public services to other Internet sites - and hardened to resist external attacks.






40. A utility that sends an ICMP Echo message to determine if a specific IP address is accessible; if the message receives a reply - the address is reachable.






41. A security protocol for wireless local area networks defined in the 802.11b standard; intended to provide the same level of security as a wired LAN. WEP is not considered strong security - although it does authenticate clients to access points - encr






42. A network administration command-line tool available for many operating systems for querying the Domain Name System (DNS) to obtain domain name or IP address mappings or any other specific DNS record.






43. A Canonical Name record within DNS - used to provide an alias for a domain name.






44. Hex 29






45. Establish Null Session






46. A piece of software - provided by the vendor - intended to update or fix known - discovered problems in a computer program or its supporting data.






47. Policy stating what users of a system can and cannot do with the organization's assets.






48. An evaluation conducted to determine the potential for damage to or loss of an IT asset.






49. FTP Bounce Attack






50. Malware designed to install some sort of virus - backdoor - and so on - on a target system.