Test your basic knowledge |

CEH: Certified Ethical Hacker

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A skilled hacker that straddles the line between white hat (hacking only with permission and within guidelines) and black hat (malicious hacking for personal gain). Gray hats sometime perform illegal acts to exploit technology with the intent of achi






2. A defined measure of service within a network system






3. A trusted entity that issues and revokes public key certificates. In a network - a CA is a trusted entity that issues - manages - and revokes security credentials and public keys for message encryption and/or authentication. Within a public key infra






4. A protocol for transporting data packets across a packet switched internetwork (such as the Internet). IP is a routed protocol.






5. Text or data in its encrypted form; the result of plaintext being input into a cryptographic algorithm.






6. ICMP Timestamp






7. The cyclical practice of identifying - classifying - remediating - and mitigating vulnerabilities.






8. A programming principle whereby the last piece of data added to the stack is the first piece of data taken off.






9. UDP Scan






10. The steps taken to gather evidence and information on the targets you wish to attack.






11. Conversion of plaintext to ciphertext through the use of a cryptographic algorithm.






12. The public portion of an asymmetric key pair typically used to encrypt data or verify signatures. Public keys are shared and are used to encrypt messages.






13. The Security Accounts Manager file in Windows stores all the password hashes for the system.






14. An attack where the hacker positions himself between the client and the server - to intercept (and sometimes alter) data traveling between the two.






15. An attack that combines a brute-force attack with a dictionary attack.






16. The potential for damage to or loss of an IT asset






17. A record showing which user has accessed a given resource and what operations the user performed during a given period.






18. Weakness in an information system - system security procedures - internal controls - or implementation that could be exploited or triggered by a threat source.






19. The act of using numerous electronic serial numbers on a cell phone until a valid number is located.






20. Layer 6 of the OSI reference model. The Presentation layer ensures information sent by the Application layer of the sending system will be readable by the Application layer of the receiving system.






21. A type of DNS transfer - where all records from an SOA are transmitted to the requestor. Zone transfers have two options: full (opcode AXFR) and incremental (IXFR).






22. An Application layer protocol for sending electronic mail between servers.






23. Host-based IDS. An IDS that resides on the host - protecting against file and folder manipulation and other host-based attacks and actions.






24. A value used to control cryptographic operations - such as decryption -encryption - signature generation - and signature verification.






25. ICMP Type/Code 8






26. nmap






27. A TCP flag notifying an originating station that the preceding packet (or packets) has been received.






28. In a classful IPv4 subnet - this is the network number with all binary 0s in the subnet part of the number. When written in decimal - the zero subnet has the same number as the classful network number.






29. A communications path - such as the Internet - authorized for data transmission within a computer system or network.






30. An information assurance strategy in which multiple layers of defense are placed throughout an Information Technology system.






31. A piece of software - provided by the vendor - intended to update or fix known - discovered problems in a computer program or its supporting data.






32. Any kind of connection that allows you to see all traffic passing by. Generally used in reference to a NIDS (network-based IDS) to monitor all traffic.






33. Security measures - such as a locked door - perimeter fence - or security guard - to prevent or deter physical access to a facility - resource - or information stored on physical media.






34. A function that is easy to compute in one direction - yet believed to be difficult to compute in the opposite direction (finding its inverse) without special information - called the 'trapdoor.' Widely used in cryptography.






35. ICMP Ping






36. A denial-of-service attack where the attacker sends a ping to the network's broadcast address from the spoofed IP address of the target. All systems in the subnet then respond to the spoofed address - eventually flooding the device.






37. A wireless LAN device that acts as a central point for all wireless traffic. The AP is connected to both the wireless LAN and the wired LAN - providing wireless clients access to network resources.






38. A fully qualified domain name consists of a host and domain name - including a top-level domain such as .com - .net - .mil - .edu -and so on.






39. A backlog of packets stored in buffers and waiting to be forwarded over an interface.






40. A protocol for exchanging packets over a serial line.






41. Computer software or hardware that can intercept and log traffic passing over a digital network.






42. A set of hardware - software - people - policies - and procedures needed to create - manage - distribute - use - store - and revoke digital certificates.






43. The default network authentication suite of protocols for Windows NT 4.0






44. Physical socket provided on routers and switches for cable connections between a computer and the router/switch. This connection enables the computer to configure - query - and troubleshoot the router/switch by use of a terminal emulator and a comman






45. An approach to restricting system access to authorized users in which roles are created for various job functions. The permissions to perform certain operations are assigned to specific roles. Members of staff (or other system users) are assigned par






46. The process of attaching a particular protocol header and trailer to a unit of data before transmission on the network. Occurs at layer 2 of the OSI reference model.






47. Chronological record of system activities to enable the reconstruction and examination of the sequence of events and changes in an event.






48. The science or study of protecting information - whether in transit or at rest - by using techniques to render the information unusable to anyone who does not possess the means to decrypt it.






49. Shifting responsibility from one party to another






50. In regard to hash algorithms - this occurs when two or more distinct inputs produce the same output.