Test your basic knowledge |

CEH: Certified Ethical Hacker

  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A person or entity indirectly involved in a relationship between two principles.

2. Attacks on the actual programming code of an application.

3. Port 161/162

4. A virus written in a macro language and usually embedded in document or spreadsheet files.

5. A mode of operation in a wireless LAN in which clients send data directly to one another without utilizing a wireless access point (WAP) - much like a point-to-point wired connection.

6. A computer placed outside a firewall to provide public services to other Internet sites - and hardened to resist external attacks.

7. An authentication method on point-to-point links - using a three-way handshake and a mutually agreed-upon key.

8. ICMP Netmask

9. A method of defining what rights and permissions an entity has to a given resource. In networking - Access Control Lists are commonly associated with firewall and router traffic filtering rules.

10. A host designed to collect data on suspicious activity.

11. The lack of clocking (imposed time ordering) on a bit stream.

12. A method of permitting only MAC addresses in a preapproved list network access. Addresses not matching are blocked.

13. A computer file system architecture used in Windows - OS/2 - and most memory cards.

14. A query and response protocol widely used for querying databases that store the registered users or assignees of an Internet resource - such as a domain name - an IP address - or an autonomous system.

15. 1. The path a packet travels to reach the intended destination. Each individual device along the path traveled is called a hop. 2. Information contained on a device containing instructions for reaching other nodes on the network. This information can

16. Port Scanning

17. All measures and techniques taken to gather information about an intended target. Footprinting can be passive or active.

18. Port 389

19. A protocol for exchanging packets over a serial line.

20. Software that has advertisements embedded within. Generally displays ads in the form of pop-ups.

21. Monitoring of telephone or Internet conversations - typically by covert means.


23. A command used in HTTP and FTP to retrieve a file from a server.

24. The subjective - potential percentage of loss to a specific asset if a specific threat is realized. The exposure factor (EF) is a subjective value the person assessing risk must define.

25. LM Hash for short passwords (under 7)

26. A device that provides access between two or more networks. Gateways are typically used to connect dissimilar networks.

27. A protocol defining packets that are able to be routed by a router.

28. The set of all hardware - firmware - and/or software components critical to IT security. Bugs or vulnerabilities occurring inside the TCB might jeopardize the security properties of the entire system.

29. An e-mail protection method using a secret message or image that can be referenced on any official communication with the site; if an e-mail is received without the image or message - the recipient knows it is not legitimate.

30. An outdated symmetric cipher encryption algorithm - previously U.S. government-approved and used by business and civilian government agencies. DES is no longer considered secure due to the ease with which the entire keyspace can be attempted using mo

31. A string used for authentication in SNMP. The public community string is used for read-only searches - whereas the private community string is used for read/write. Community strings are transmitted in clear text in SNMPv1. SNMPv3 provides encryption

32. A command that instructs the system processor to do nothing. Many overflow attacks involve stringing several NOP operations together (known as a NOP sled).

33. A pen testing method where the attacker knows all information about the internal network. It is designed to simulate an attack by a disgruntled systems administrator - or similar level.

34. An organization composed of engineers - scientists - and students who issue standards related to electrical - electronic - and computer engineering.

35. An e-mail message warning users of a nonexistent virus and encouraging them to pass on the message to other users.

36. Normal scan timing

37. A systematic process for the assessment of security vulnerabilities.

38. An electronic version of junk mail. Unsolicited commercial e-mail sent to numerous recipients.

39. Manipulating a search string with additional specific operators to search for vulnerabilities or very specific information.

40. ACK Scan

41. A limit on the amount of time or number of iterations or transmissions in computer and network technology a packet can experience before it will be discarded.

42. Provides data encryption for IEEE 802.11 wireless networks so data can only be decrypted by the intended recipients.

43. Nmap grepable output

44. An Internet Protocol Security (IPSec) header used to verify that the contents of a packet have not been modified while the packet was in transit.

45. A device or service designed to obfuscate traffic between a client and the Internet. Generally used to make activity on the Internet as untraceable as possible.

46. A configuration of a network card that makes the card pass all traffic it receives to the central processing unit rather than just frames addressed to it

47. A routing protocol developed to be used within a single organization.

48. Port 110

49. Window Scan

50. Defined in RFC 826 - ARP is a protocol used to map a known IP address to a physical (MAC) address.