Test your basic knowledge |

CEH: Certified Ethical Hacker

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Method used by antivirus software to detect new - unknown viruses that have not yet been identified; based on a piece-by-piece examination of a program - looking for a sequence or sequences of instructions that differentiate the virus from 'normal' p






2. Port 161/162






3. The level of importance assigned to an IT asset






4. Attacks on the actual programming code of an application.






5. A communications path - such as the Internet - authorized for data transmission within a computer system or network.






6. 1. The path a packet travels to reach the intended destination. Each individual device along the path traveled is called a hop. 2. Information contained on a device containing instructions for reaching other nodes on the network. This information can






7. A nonroutable IP address range intended for use only within the confines of a single organization - falling within the predefined ranges of 10.0.0.0 - 172.16-31.0.0 - or 192.168.0.0.






8. Traffic-passing technique used by bridges and switches in which traffic received on an interface is sent out all interfaces on the device except the interface on which the information was originally received. Traffic on a switch is flooded when it is






9. A data encryption/decryption program often used for e-mail and file storage.






10. A domain composed of all the systems sharing any given physical transport media. Systems within a collision domain may collide with each other during the transmission of data. Collisions can be managed by CSMA/CD (collision detection) or CSMA/CA (col






11. An attack that is direct in nature - usually where the attacker injects something into - or otherwise alters - the network or system target.






12. Window Scan






13. A protocol for exchanging packets over a serial line.






14. TCP connect() scan






15. A program designed to execute at a specific time to release malicious code onto the computer system or network.






16. The act of using numerous electronic serial numbers on a cell phone until a valid number is located.






17. The security property that data is not modified in an unauthorized and undetected manner. Also - the principle and measures taken to ensure that data received is in the exact same condition and state as when it was originally transmitted.






18. An approach to restricting system access to authorized users in which roles are created for various job functions. The permissions to perform certain operations are assigned to specific roles. Members of staff (or other system users) are assigned par






19. RPC Scan






20. A device providing temporary - on-demand - point-to-point network access to users.






21. ICMP Type/Code 11






22. An attack where the hacker manipulates parameters within the URL string in hopes of modifying data.






23. A cryptographic attack where bits are manipulated in the ciphertext itself to generate a predictable outcome in the plaintext once it is decrypted.






24. A nonnumerical - subjective risk evaluation. Used with qualitative assessment (an evaluation of risk that results in ratings of none - low - medium - and high for the probability.)






25. A value used to control cryptographic operations - such as decryption -encryption - signature generation - and signature verification.






26. A proprietary - open - wireless technology used for transferring data from fixed and mobile devices over short distances.






27. A wireless networking mode where all clients connect to the wireless network through a central access point.






28. Sending unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobile phones - PDAs - or laptop computers.






29. The process of systematically testing each port on a firewall to map rules and determine accessible ports.






30. The central part of a computer or communications system hardware firmware - and software that implements the basic security procedures for controlling access to system resources.






31. An attack in which the hacker can derive information from the ciphertext without actually decoding it. Sensitive information can be considered compromised if an adversary can infer its real value with a high level of confidence.






32. A portion of memory used to temporarily store output or input data.






33. FIN Scan






34. A formal set of rules describing data transmission - especially across a network. A protocol determines the type of error checking - the data compression method - how the sending device will indicate completion - how the receiving device will indicat






35. A backlog of packets stored in buffers and waiting to be forwarded over an interface.






36. A partially protected zone on a network - not exposed to the full fury of the Internet - but not fully behind the firewall. This technique is typically used on parts of the network that must remain open to the public (such as a web server) but must a






37. Evaluation in which testers attempt to penetrate the network.






38. A computer system that performs tasks dictated by an attacker from a remote location. Zombies may be active or idle - and owners of the systems generally do not know their systems are compromised.






39. Wrapper or Binder






40. A mode of operation for a block cipher - with the characteristic that each possible block of plaintext has a defined corresponding ciphertext value - and vice versa






41. A class of algorithms for cryptography that use the same cryptographic key for both decryption and encryption.






42. A cyber attacker who acts without permission from - and gives prior notice to - the resource owner. Also known as a malicious hacker.






43. In penetration testing - this is a method of testing the security of a system or subnet without any previous knowledge of the device or network. Designed to simulate an attack by an outside intruder (usually from the Internet).






44. The rate at which a biometric system will incorrectly reject an access attempt by an authorized user.






45. Conversion of plaintext to ciphertext through the use of a cryptographic algorithm.






46. A distance-vector routing protocol that employs the hop count as a routing metric. The 'hold down time -' used to define how long a route is held in memory - is 180 seconds. RIP prevents routing loops by implementing a limit on the number of hops all






47. Defined in RFC 826 - ARP is a protocol used to map a known IP address to a physical (MAC) address.






48. Network Scanning






49. A Windows-based GUI version of nmap.






50. An agreement between the penetration tester and the client detailing the activities the tester is permitted to perform.