Test your basic knowledge |

CEH: Certified Ethical Hacker

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The subjective - potential percentage of loss to a specific asset if a specific threat is realized. The exposure factor (EF) is a subjective value the person assessing risk must define.






2. An environmentally conditioned workspace partially equipped with IT and telecommunications equipment to support relocated IT operations in the event of a significant disruption.






3. A TCP flag notifying an originating station that the preceding packet (or packets) has been received.






4. A section or subset of the network. Often a router or other routing device provides the end point of the segment.






5. Ports 20/21






6. A backup facility with the electrical and physical components of a computer facility - but with no computer equipment in place. The site is ready to receive the necessary replacement computer equipment in the event the user has to move from his main






7. The steps taken to gather evidence and information on the targets you wish to attack.






8. Layer 2 of the OSI reference model. This layer provides reliable transit of data across a physical link. The Data Link layer is concerned with physical addressing - network topology - access to the network medium - error detection - sequential delive






9. A term representing the responsibility managers and their organizations have to provide information security to ensure the type of control - the cost of control - and the deployment of control are appropriate for the system being managed.






10. Text or data in its encrypted form; the result of plaintext being input into a cryptographic algorithm.






11. Also known as a public key certificate - this is an electronic file that is used to verify a user's identity - providing non-repudiation throughout the sys-tem. Certificates contain the entity's public key - serial number - version - subject - algori






12. A stand-alone computer - kept off the network - that is used for scanning potentially malicious media or software.






13. Authentication confirms the identity of the user or device. Authorization determines the privileges (rights) of the user or device. Accounting records the access attempts - both successful and unsuccessful.






14. TCP connect() scan






15. Method used by antivirus software to detect new - unknown viruses that have not yet been identified; based on a piece-by-piece examination of a program - looking for a sequence or sequences of instructions that differentiate the virus from 'normal' p






16. A value assigned to uniquely identify a single wide area network (WAN) in wireless LANs. SSIDs are broadcast by default - and are sent in the header of every packet. SSIDs provide no encryption or security.






17. An evaluation conducted to determine the potential for damage to or loss of an IT asset.






18. An Application layer protocol for sending electronic mail between servers.






19. A remote control program in which the client runs on a local computer and connects to a remote server on a network. Commands entered locally are executed on the remote system.






20. An Internet routing protocol used to exchange routing information within an autonomous system.






21. Directory Transversal






22. A systematic process for the assessment of security vulnerabilities.






23. Port 137/138/139






24. White hat






25. A standard for encrypting and authenticating MIME data; used primarily for Internet e-mail.






26. A hybrid of the HTTP and SSL/TLS protocols that provides encrypted communication and secure identification of a web server.






27. Devices - connected to one or more switches - grouped logically into a single broadcast domain. VLANs enable administrators to divide the devices connected to the switches into multiple VLANs without requiring separate physical switches.






28. The process of recording activity on a system for monitoring and later review.






29. A firewall evasion technique whereby packets are wrapped in HTTP - as a covert channel to the target.






30. Establish Null Session






31. A type of DNS transfer - where all records from an SOA are transmitted to the requestor. Zone transfers have two options: full (opcode AXFR) and incremental (IXFR).






32. Recording the time - normally in a log file - when an event happens or when information is created or modified.






33. An international encoding standard - working within multiple languages and scripts - that represents each letter - digit - or symbol with a unique numeric value that applies across different platforms.






34. An attack where the hacker manipulates parameters within the URL string in hopes of modifying data.






35. A U.S. Department of Defense (DoD) standard that sets basic requirements for assessing the effectiveness of computer security controls built into a computer system.






36. ICMP Type/Code 3-13






37. Host-based IDS. An IDS that resides on the host - protecting against file and folder manipulation and other host-based attacks and actions.






38. Metamorphic Virus






39. A class of algorithms for cryptography that use the same cryptographic key for both decryption and encryption.






40. As an identification device becomes more sensitive or accurate - its FAR decreases while its FRR increases. The CER is the point at which these two rates are equal - or cross over.






41. The monetary loss that can be expected for an asset due to risk over a one-year period. ALE is the product of the annual rate of occurrence (ARO) and the single loss expectancy (SLE). It is mathematically expressed as ALE = ARO






42. A self-replicating malicious program that attempts installation beneath antivirus software by directly intercepting the interrupt handlers of the operating system to evade detection.






43. The set of all hardware - firmware - and/or software components critical to IT security. Bugs or vulnerabilities occurring inside the TCB might jeopardize the security properties of the entire system.






44. A measurable - physical characteristic used to recognize the identity - or verify the claimed identity - of an applicant. Facial images - fingerprints - and handwriting samples are all examples of biometrics.






45. The ability to trace actions performed on a system to a specific user or system entity.






46. The process of embedding information into a digital signal in a way that makes it difficult to remove.






47. A group of people - gathered together by a business entity - working to address a specific problem or goal.






48. A device or service designed to obfuscate traffic between a client and the Internet. Generally used to make activity on the Internet as untraceable as possible.






49. A protocol that allows a client computer to request services from a server and the server to return the results.






50. A text file stored within a browser by a web server that maintains information about the connection. Cookies are used to store information to maintain a unique but consistent surfing experience - but can also contain authentication parameters. Cookie