Test your basic knowledge |

CEH: Certified Ethical Hacker

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The process of pinging each address within a subnet to map potential targets. Ping sweeps are unreliable and easily detectable - but very fast.






2. A protocol that allows a client computer to request services from a server and the server to return the results.






3. A utility that sends an ICMP Echo message to determine if a specific IP address is accessible; if the message receives a reply - the address is reachable.






4. A nontechnical method of hacking. Social engineering is the art of manipulating people - whether in person (human-based) or via computing methods (computer-based) - into providing sensitive information.






5. A denial-of-service attack where the attacker sends a ping to the network's broadcast address from the spoofed IP address of the target. All systems in the subnet then respond to the spoofed address - eventually flooding the device.






6. A TCP flag notifying an originating station that the preceding packet (or packets) has been received.






7. A storage buffer that transparently stores data so future requests for the same data can be served faster.






8. An attack where the hacker positions himself between the client and the server - to intercept (and sometimes alter) data traveling between the two.






9. A record showing which user has accessed a given resource and what operations the user performed during a given period.






10. A virus written in a macro language and usually embedded in document or spreadsheet files.






11. Black hat






12. In regard to hash algorithms - this occurs when two or more distinct inputs produce the same output.






13. Drawing symbols in public places to alert others to an open Wi-Fi network. War chalking can include the SSIDs - administrative passwords to APs - and other information.






14. An electronic version of junk mail. Unsolicited commercial e-mail sent to numerous recipients.






15. Nmap ml output






16. A secret - typically consisting of only decimal digits - that a claimant memorizes and uses to authenticate his identity






17. A point of reference used to mark an initial state in order to manage change.






18. A non-self-replicating program that appears to have a useful purpose - but in reality has a different - malicious purpose.






19. A software or hardware defect that often results in system vulnerabilities.






20. A three-step process computers execute to negotiate a connection with one another. The three steps are SYN - SYN/ACK - ACK.






21. A card with a built-in microprocessor and memory used for identification or financial transactions. The card transfers data to and from a central computer when inserted into a reader.






22. An e-mail protection method using a secret message or image that can be referenced on any official communication with the site; if an e-mail is received without the image or message - the recipient knows it is not legitimate.






23. A stand-alone computer - kept off the network - that is used for scanning potentially malicious media or software.






24. An evaluation conducted to determine the potential for damage to or loss of an IT asset.






25. An informed decision to accept the potential for damage to or loss of an IT asset.






26. The act of searching for Wi-Fi wireless networks by a person in a moving vehicle - using a portable device.






27. A section or subset of the network. Often a router or other routing device provides the end point of the segment.






28. A computer security expert who performs security audits and penetration tests against systems or network segments - with the owner's full knowledge and permission - in an effort to increase security.






29. Port 110






30. Hex 04






31. Hex 29






32. Port 88






33. Any item of value or worth to an organization - whether physical or virtual.






34. A device on a network.






35. The secret portion of an asymmetric key pair typically used to decrypt or digitally sign data. The private key is never shared and is always used for decryption - with one notable exception: The private key is used to encrypt the digital signature.






36. RPC Scan






37. The potential for damage to or loss of an IT asset






38. Hex 14






39. List Scan






40. A standard for encrypting and authenticating MIME data; used primarily for Internet e-mail.






41. A computer process that requests a service from another computer and accepts the server's responses.






42. The lack of clocking (imposed time ordering) on a bit stream.






43. A standard that provides best-practice recommendations on information security management for use by those responsible for initiating - implementing - or maintaining Information Security Management Systems (ISMS). Information security is defined with






44. A connectionless - layer 4 transport protocol. UDP is faster than TCP - but offers no reliability. A best effort is made to deliver the data - but no checks and verifications are performed to guarantee delivery. Therefore - UDP is termed a 'connectio






45. nmap






46. A string that represents the location of a web resource






47. A mathematical operation requiring two binary inputs: If the inputs match - the output is a 0 - otherwise it is a 1.






48. Name given to expert groups that handle computer security incidents.






49. The act of using numerous electronic serial numbers on a cell phone until a valid number is located.






50. A technology that establishes a tunnel to create a private - dedicated - leased-line network over the Internet. The data is encrypted so it's readable only by the sender and receiver. Companies commonly use VPNs to allow employees to connect securely