Test your basic knowledge |

CEH: Certified Ethical Hacker

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A distance-vector routing protocol that employs the hop count as a routing metric. The 'hold down time -' used to define how long a route is held in memory - is 180 seconds. RIP prevents routing loops by implementing a limit on the number of hops all






2. Originally an extension of PPP - this is a protocol for authentication used within wireless networks. Works with multiple authentication measures.






3. A computer placed outside a firewall to provide public services to other Internet sites - and hardened to resist external attacks.






4. As an identification device becomes more sensitive or accurate - its FAR decreases while its FRR increases. The CER is the point at which these two rates are equal - or cross over.






5. An attack in which a hacker steps between two ends of an already-established communication session and uses specialized tools to guess sequence numbers to take over the channel.






6. In penetration testing - enumeration is the act of querying a device or network segment thoroughly and systematically for information.






7. A string that represents the location of a web resource






8. RPC Scan






9. The secret portion of an asymmetric key pair typically used to decrypt or digitally sign data. The private key is never shared and is always used for decryption - with one notable exception: The private key is used to encrypt the digital signature.






10. A communications channel that is being used for a purpose it was not intended for - usually to transfer information secretly.






11. A computer network confined to a relatively small area - such as a single building or campus - in which devices connect through high-frequency radio waves using IEEE standard 802.11.






12. A method in cryptography by which cryptographic keys are exchanged between users - allowing use of a cryptographic algorithm (for example - the Diffie-Hellman key exchange).






13. A Windows-based GUI version of nmap.






14. A computer system that performs tasks dictated by an attacker from a remote location. Zombies may be active or idle - and owners of the systems generally do not know their systems are compromised.






15. Using conversation or some other interaction between people to gather useful information.






16. The set of all hardware - firmware - and/or software components critical to IT security. Bugs or vulnerabilities occurring inside the TCB might jeopardize the security properties of the entire system.






17. A type of encryption where the same key is used to encrypt and decrypt the message.






18. A skilled hacker that straddles the line between white hat (hacking only with permission and within guidelines) and black hat (malicious hacking for personal gain). Gray hats sometime perform illegal acts to exploit technology with the intent of achi






19. A nonroutable IP address range intended for use only within the confines of a single organization - falling within the predefined ranges of 10.0.0.0 - 172.16-31.0.0 - or 192.168.0.0.






20. A partially protected zone on a network - not exposed to the full fury of the Internet - but not fully behind the firewall. This technique is typically used on parts of the network that must remain open to the public (such as a web server) but must a






21. A record showing which user has accessed a given resource and what operations the user performed during a given period.






22. Attacks that take advantage of the built-in code and scripts most off-the-shelf applications come with.






23. A set of related communications protocols operating together as a group to address communication at some or all of the seven layers of the OSI reference model.






24. A security protocol for wireless local area networks defined in the 802.11b standard; intended to provide the same level of security as a wired LAN. WEP is not considered strong security - although it does authenticate clients to access points - encr






25. Port 389






26. A small space having two sets of interlocking doors; the first set of doors must close before the second set opens. Typically authentication is required for each door - often using different factors. For example - a smart card may open the first door






27. A biometric device that uses pattern-recognition techniques based on images of the irises of an individual's eyes.






28. Provides router-to-router or host-to-network connections over asynchronous and synchronous circuits.






29. Authentication confirms the identity of the user or device. Authorization determines the privileges (rights) of the user or device. Accounting records the access attempts - both successful and unsuccessful.






30. An announcement - typically from a software vendor - of a known security vulnerability in a program; often the bulletin contains instructions for the application of a software patch.






31. A group of people - gathered together by a business entity - working to address a specific problem or goal.






32. A background process found in Unix - Linux - Solaris - and other Unix-based operating systems.






33. Software used to bind a Trojan and a legitimate program together so the Trojan will be installed when the legitimate program is executed.






34. Formal description and evaluation of the vulnerabilities in an information system






35. A TCP flag notifying an originating station that the preceding packet (or packets) has been received.






36. An outdated symmetric cipher encryption algorithm - previously U.S. government-approved and used by business and civilian government agencies. DES is no longer considered secure due to the ease with which the entire keyspace can be attempted using mo






37. A software program for remotely controlling a Microsoft Windows computer system over a network. Generally considered malware.






38. Port 135






39. A wireless LAN security standard developed by IEEE. Requires Temporal Key Integrity Protocol (TKIP) and Advanced Encryption Standard (AES).






40. The act of checking some sequence of tokens for the presence of the constituents of some pattern.






41. Establish Null Session






42. Confidentiality - Integrity - and Availability are the three aspects of security and make up the triangle.






43. Physical socket provided on routers and switches for cable connections between a computer and the router/switch. This connection enables the computer to configure - query - and troubleshoot the router/switch by use of a terminal emulator and a comman






44. A domain composed of all the systems sharing any given physical transport media. Systems within a collision domain may collide with each other during the transmission of data. Collisions can be managed by CSMA/CD (collision detection) or CSMA/CA (col






45. Freely and readily available information on an organization that can be gathered by a business entity about its competitor's customers - products - and marketing - and can be used by an attacker to build useful information for further attacks.






46. A security protocol used in IEEE 802.11i to replace WEP without the requirement to replace legacy hardware.






47. Activities to determine the extent to which a security control is implemented correctly - operating as intended - and producing the desired outcome with respect to meeting the security requirements for the system.






48. Insane scan timing






49. A means of restricting access to system resources based on the sensitivity (as represented by a label) of the information contained in the system resource and the formal authorization (that is - clearance) of users to access information of such sensi






50. ICMP Netmask