Test your basic knowledge |

CEH: Certified Ethical Hacker

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A standard developed to enable routers to exchange messages containing information about routes to reach subnets in the network.






2. ICMP Type/Code 11






3. Controls internal to a system designed to resolve vulnerabilities and errors soon after they arise.






4. A method of external testing whereby several systems or resources are used together to effect an attack.






5. A Unix-like computer operating system descending from the BSD. Open-BSD includes a number of security features absent or optional in other operating systems.






6. IP Protocol Scan






7. A card with a built-in microprocessor and memory used for identification or financial transactions. The card transfers data to and from a central computer when inserted into a reader.






8. Physical socket provided on routers and switches for cable connections between a computer and the router/switch. This connection enables the computer to configure - query - and troubleshoot the router/switch by use of a terminal emulator and a comman






9. A method of evaluating the security of a computer system or network by simulating an attack from a malicious source.






10. A Canonical Name record within DNS - used to provide an alias for a domain name.






11. A type of encryption where the same key is used to encrypt and decrypt the message.






12. An organized collection of data.






13. List Scan






14. A list of IP addresses and corresponding MAC addresses stored on a local computer.






15. Ports 20/21






16. A security tool designed to protect a system or network against attacks by comparing traffic patterns against a list of both known attack signatures and general characteristics of how attacks may be carried out. Threats are rated and reported.






17. An Application layer protocol for sending electronic mail between servers.






18. In penetration testing - this is a method of testing the security of a system or subnet without any previous knowledge of the device or network. Designed to simulate an attack by an outside intruder (usually from the Internet).






19. An Application layer protocol - using TCP - for transporting files across an Internet connection. FTP transmits in clear text.






20. A storage buffer that transparently stores data so future requests for the same data can be served faster.






21. Process of breaking a packet into smaller units when it is being transmitted over a network medium that's unable to support a transmission unit the original size of the packet.






22. A type 0 ICMP message used to reply to ECHO requests. Used with ping to verify network layer connectivity between hosts.






23. Port 31337






24. Authentication confirms the identity of the user or device. Authorization determines the privileges (rights) of the user or device. Accounting records the access attempts - both successful and unsuccessful.






25. Port 22






26. A set of hardware - software - people - policies - and procedures needed to create - manage - distribute - use - store - and revoke digital certificates.






27. Nmap normal output






28. Software code - a portion of data - or sequence of commands intended to take advantage of a bug or vulnerability in order to cause unintended or unanticipated behavior to occur on computer software or hardware.






29. A device on a network.






30. The security property that data is not modified in an unauthorized and undetected manner. Also - the principle and measures taken to ensure that data received is in the exact same condition and state as when it was originally transmitted.






31. The result of using a private key to encrypt a hash value for identification purposes within a PKI system. The signature can be decoded by the originator's public key - verifying his identity and providing non-repudiation. A valid digital signature g






32. Another term for firewalking






33. A file system used by the Mac OS.






34. Phases of an attack






35. Window Scan






36. Any kind of connection that allows you to see all traffic passing by. Generally used in reference to a NIDS (network-based IDS) to monitor all traffic.






37. Layer 6 of the OSI reference model. The Presentation layer ensures information sent by the Application layer of the sending system will be readable by the Application layer of the receiving system.






38. A configuration of a network card that makes the card pass all traffic it receives to the central processing unit rather than just frames addressed to it






39. An inspection of a place where a company or individual proposes to work - to gather the necessary information for a design or risk assessment.






40. ICMP Type/Code 0-0






41. A nonroutable IP address range intended for use only within the confines of a single organization - falling within the predefined ranges of 10.0.0.0 - 172.16-31.0.0 - or 192.168.0.0.






42. An international organization composed of national standards bodies from over 75 countries. Developed the OSI reference model.






43. A type of attack used to deny service to legitimate users of a network resource by intentionally overloading the network with illegitimate TCP connection requests. SYN packets are sent repeatedly to the target - but the corresponding SYN/ACK response






44. A protocol used for sending and receiving log information for nodes on a network.






45. The means by which a recipient of a message can ensure the identity of the sender and that neither party can deny having sent or received the message. The most common method is through digital certificates.






46. A computer placed outside a firewall to provide public services to other Internet sites - and hardened to resist external attacks.






47. UDP Scan






48. An outdated symmetric cipher encryption algorithm - previously U.S. government-approved and used by business and civilian government agencies. DES is no longer considered secure due to the ease with which the entire keyspace can be attempted using mo






49. In a classful IPv4 subnet - this is the network number with all binary 0s in the subnet part of the number. When written in decimal - the zero subnet has the same number as the classful network number.






50. Vulnerability Scanning