Test your basic knowledge |

CEH: Certified Ethical Hacker

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A connection-oriented - layer 4 protocol for transporting data over network segments. TCP is considered reliable because it guarantees delivery and the proper reordering of transmitted packets. This protocol is used for most long-haul traffic on the






2. A communications channel that is being used for a purpose it was not intended for - usually to transfer information secretly.






3. A background process found in Unix - Linux - Solaris - and other Unix-based operating systems.






4. Shifting responsibility from one party to another






5. The result of using a private key to encrypt a hash value for identification purposes within a PKI system. The signature can be decoded by the originator's public key - verifying his identity and providing non-repudiation. A valid digital signature g






6. Software or hardware components that restrict access between a protected network and the Internet - or between other sets of networks - to block unwanted use or attacks.






7. Activities to determine the extent to which a security control is implemented correctly - operating as intended - and producing the desired outcome with respect to meeting the security requirements for the system.






8. Microsoft SID 500






9. 18 U.S.C. 1030






10. Also known as a digital certificate - this is an electronic file used to verify a user's identity - providing non-repudiation throughout the system It is also a set of data that uniquely identifies an entity. Certificates contain the entity's public






11. A communications protocol used for browsing the Internet.






12. A set of rules defined by a system administrator that indicates whether access is allowed or denied to resource objects.






13. ICMP Type/Code 0-0






14. The level of importance assigned to an IT asset






15. The act of using numerous electronic serial numbers on a cell phone until a valid number is located.






16. A tool that helps a company to compare its actual performance with its potential performance.






17. Hex 12






18. An Internet routing protocol used to exchange routing information within an autonomous system.






19. The set of all hardware - firmware - and/or software components critical to IT security. Bugs or vulnerabilities occurring inside the TCB might jeopardize the security properties of the entire system.






20. Layer 2 of the OSI reference model. This layer provides reliable transit of data across a physical link. The Data Link layer is concerned with physical addressing - network topology - access to the network medium - error detection - sequential delive






21. ICMP Type/Code 3-13






22. A free - open source version of the Berkeley Software Distribution of Unix - often used in embedded systems.






23. A hardware device used to log keystrokes covertly. Hardware keystroke loggers are very dangerous due to the fact that they cannot be detected through regular software/anti-malware scanning.






24. An enumeration technique used to provide information about a computer system; generally used for operating system identification (also known as fingerprinting).






25. A standard that provides best-practice recommendations on information security management for use by those responsible for initiating - implementing - or maintaining Information Security Management Systems (ISMS). Information security is defined with






26. The act of checking some sequence of tokens for the presence of the constituents of some pattern.






27. A set of exclusive rights granted by the law of a jurisdiction to the author or creator of an original work - including the right to copy - distribute - and adapt the work.






28. Chronological record of system activities to enable the reconstruction and examination of the sequence of events and changes in an event.






29. Nmap normal output






30. Version Detection Scan






31. An Application layer protocol - using TCP - for transporting files across an Internet connection. FTP transmits in clear text.






32. A method of defining what rights and permissions an entity has to a given resource. In networking - Access Control Lists are commonly associated with firewall and router traffic filtering rules.






33. In penetration testing - this is a method of testing the security of a system or subnet without any previous knowledge of the device or network. Designed to simulate an attack by an outside intruder (usually from the Internet).






34. Layer 7 of the OSI reference model. The Application layer provides services to applications - which allow them access to the network. Protocols such as FTP and SMTP reside here.






35. A skilled hacker that straddles the line between white hat (hacking only with permission and within guidelines) and black hat (malicious hacking for personal gain). Gray hats sometime perform illegal acts to exploit technology with the intent of achi






36. A sublayer of layer 2 of the OSI model - the Data Link layer. It provides addressing and channel access control mechanisms that enable several terminals or network nodes to communicate within a multipoint network.






37. An attack that exploits the common mistake many people make when installing operating systems






38. Attacks that take advantage of the built-in code and scripts most off-the-shelf applications come with.






39. Port 31337






40. Provides router-to-router or host-to-network connections over asynchronous and synchronous circuits.






41. A data encryption/decryption program often used for e-mail and file storage.






42. A method used to prevent IDS detection by dividing the request into multiple parts that are sent in different packets






43. Polymorphic Virus






44. Port 161/162






45. A method of password cracking whereby all possible options are systematically enumerated until a match is found. These attacks try every password (or authentication option) - one after another - until successful. Bruteforce attacks take a long time t






46. The process of a system providing a fully qualified domain name (FQDN) to a local name server - for resolution to its corresponding IP address.






47. A utility that traces a packet from your computer to an Internet host - showing how many hops the packet takes to reach the host and how long the packet requires to complete the hop.






48. Management policy and procedures designed to maintain or restore business operations - including computer operations - possibly at an alternate location - in the event of emergencies - system failures - or disaster.






49. Weakness in an information system - system security procedures - internal controls - or implementation that could be exploited or triggered by a threat source.






50. Evaluation in which testers attempt to penetrate the network.