Test your basic knowledge |

CEH: Certified Ethical Hacker

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. One or more locations from which control is exercised over a computer - television broadcast - or telecommunications network.






2. A method used to prevent IDS detection by dividing the request into multiple parts that are sent in different packets






3. Software that has advertisements embedded within. Generally displays ads in the form of pop-ups.






4. An international encoding standard - working within multiple languages and scripts - that represents each letter - digit - or symbol with a unique numeric value that applies across different platforms.






5. A text file stored within a browser by a web server that maintains information about the connection. Cookies are used to store information to maintain a unique but consistent surfing experience - but can also contain authentication parameters. Cookie






6. Also known as a public key certificate - this is an electronic file that is used to verify a user's identity - providing non-repudiation throughout the sys-tem. Certificates contain the entity's public key - serial number - version - subject - algori






7. A nontechnical method of hacking. Social engineering is the art of manipulating people - whether in person (human-based) or via computing methods (computer-based) - into providing sensitive information.






8. White box test






9. Network Scanning






10. MAC Flooding






11. A computer file system architecture used in Windows - OS/2 - and most memory cards.






12. A nonnumerical - subjective risk evaluation. Used with qualitative assessment (an evaluation of risk that results in ratings of none - low - medium - and high for the probability.)






13. Aggressive scan timing






14. A firewall evasion technique whereby packets are wrapped in HTTP - as a covert channel to the target.






15. An organization's threshold for the seven areas of information security responsibility. This level is established based on the objectives for maintaining confidentiality - integrity - and availability of the organization's IT assets and infrastructur






16. Normal scan timing






17. A method of evaluating the security of a computer system or network by simulating an attack from a malicious source.






18. The Security Accounts Manager file in Windows stores all the password hashes for the system.






19. A set of exclusive rights granted by the law of a jurisdiction to the author or creator of an original work - including the right to copy - distribute - and adapt the work.






20. Insane scan timing






21. A connection-oriented - layer 4 protocol for transporting data over network segments. TCP is considered reliable because it guarantees delivery and the proper reordering of transmitted packets. This protocol is used for most long-haul traffic on the






22. Security measures - such as a locked door - perimeter fence - or security guard - to prevent or deter physical access to a facility - resource - or information stored on physical media.






23. Port 389






24. A Canonical Name record within DNS - used to provide an alias for a domain name.






25. An application that monitors a computer or network to identify - and prevent - malware. AV is usually signature-based - and can take multiple actions on defined malware files/activity.






26. Content Addressable Memory table. Holds all the MAC-address-to-port mappings on a switch.






27. A protocol for exchanging packets over a serial line.






28. Nmap normal output






29. The process of systematically testing each port on a firewall to map rules and determine accessible ports.






30. Directing a protocol from one port to another.






31. A network traffic management technique designed to allow applications to specify the route a packet will take to a destination - regardless of what the route tables between the two systems say.






32. Controlling access to a network by analyzing the headers of incoming and outgoing packets - and letting them pass or discarding them based on rule sets created by a network administrator. A packet filter allows or denies packets based on destination






33. An attack where the hacker manipulates parameters within the URL string in hopes of modifying data.






34. A device that provides access between two or more networks. Gateways are typically used to connect dissimilar networks.






35. A wireless access point that has either been installed on a secure company network without explicit authorization from a local network administrator - or has been created to allow a hacker to conduct a man-in-the-middle attack.






36. A method of permitting only MAC addresses in a preapproved list network access. Addresses not matching are blocked.






37. An information assurance strategy in which multiple layers of defense are placed throughout an Information Technology system.






38. A suite of protocols used for securing Internet Protocol (IP) communications by authenticating and encrypting each IP packet of a communication session. This suite includes protocols for establishing mutual authentication between agents at the sessio






39. A limited-function version of the Internetworking Operating System (IOS) - held in read-only memory in some earlier models of Cisco devices - capable of performing several seldom-needed low-level functions such as loading a new IOS into Flash memory






40. A network administration command-line tool available for many operating systems for querying the Domain Name System (DNS) to obtain domain name or IP address mappings or any other specific DNS record.






41. A device providing temporary - on-demand - point-to-point network access to users.






42. A cryptographic attack where bits are manipulated in the ciphertext itself to generate a predictable outcome in the plaintext once it is decrypted.






43. A virus written in a macro language and usually embedded in document or spreadsheet files.






44. Any circumstance or event with the potential to adversely impact organizationaloperations - organizational assets - or individuals through an information system via unauthorized access - destruction - disclosure - modification of information - and/or






45. A social-engineering attack that manipulates the victim into calling the attacker for help.






46. A mathematical operation requiring two binary inputs: If the inputs match - the output is a 0 - otherwise it is a 1.






47. A condition that occurs when more data is written to a buffer than it has space to store - and results in data corruption or other system errors. This is usually due to insufficient bounds checking - a bug - or improper configuration in the program c






48. nmap






49. The act of checking some sequence of tokens for the presence of the constituents of some pattern.






50. A secret - typically consisting of only decimal digits - that a claimant memorizes and uses to authenticate his identity