Test your basic knowledge |

CEH: Certified Ethical Hacker

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Chronological record of system activities to enable the reconstruction and examination of the sequence of events and changes in an event.






2. A virus that plants itself in a system's boot sector and infects the master boot record.






3. Used to find the domain name associated with an IP address; the opposite of a DNS lookup.






4. A network system of servers that translates numeric Internet Protocol (IP) addresses into human-friendly - hierarchical Internet addresses - and vice versa.






5. A network traffic management technique designed to allow applications to specify the route a packet will take to a destination - regardless of what the route tables between the two systems say.






6. A hybrid of the HTTP and SSL/TLS protocols that provides encrypted communication and secure identification of a web server.






7. A method in cryptography by which cryptographic keys are exchanged between users - allowing use of a cryptographic algorithm (for example - the Diffie-Hellman key exchange).






8. An evaluation conducted to determine the potential for damage to or loss of an IT asset.






9. The monetary value expected from the occurrence of a risk on an asset. It is mathematically expressed as single loss expectancy (SLE) = asset value (AV)






10. A value used to control cryptographic operations - such as decryption -encryption - signature generation - and signature verification.






11. Transmission using channels or frequencies outside those normally used for data transfer; often used for error reporting.






12. Nmap normal output






13. A point-to-point connection between two endpoints created to exchangedata. Typically a tunnel is either an encrypted connection - or a connection using a protocol in a method for which it was not designed. An encrypted connection forms a point-to-poi






14. A symmetric key cipher where plaintext bits are combined with a pseudo-random cipher bit stream (keystream) - typically by an exclusive-or (XOR) operation. In a stream cipher the plaintext digits are encrypted one at a time - and the transformation o






15. Port 53






16. An unknown deficiency in software or some other product that results in a security vulnerability being identified.






17. A set of rules defined by a system administrator that indicates whether access is allowed or denied to resource objects.






18. Hex 04






19. A routing protocol developed to be used within a single organization.






20. A device on a network.






21. A unique hostname that is used to identify resources on the Internet. Domain names start with a root (.) - then add a top level (.com - .gov - or .mil - for example) - and a given name space.






22. A type 0 ICMP message used to reply to ECHO requests. Used with ping to verify network layer connectivity between hosts.






23. A defined measure of service within a network system






24. A means of restricting access to system resources based on the sensitivity (as represented by a label) of the information contained in the system resource and the formal authorization (that is - clearance) of users to access information of such sensi






25. An outdated symmetric cipher encryption algorithm - previously U.S. government-approved and used by business and civilian government agencies. DES is no longer considered secure due to the ease with which the entire keyspace can be attempted using mo






26. Phases of an attack






27. A set of rules defined to screen network packets based on source address - destination address - or protocol; these rules determine whether the packet will be forwarded or discarded.






28. The process of using easily accessible DNS records to map a target network's internal hosts.






29. Port 161/162






30. nmap






31. When an authorized person allows (intentionally or unintentionally) someone to pass through a secure door - despite the fact that the intruder does not have a badge.






32. The art and science of creating a covert message or image within another message - image - audio - or video file.






33. Evaluation in which testers attempt to penetrate the network.






34. A type of denial-of-service attack where a hacker sends thousands of SYN packets to the target with spoofed IP addresses.






35. A network administration command-line tool available for many operating systems for querying the Domain Name System (DNS) to obtain domain name or IP address mappings or any other specific DNS record.






36. Ping Scan






37. A software program for remotely controlling a Microsoft Windows computer system over a network. Generally considered malware.






38. The process of using an application to remotely identify open ports on a system (for example - whether systems allow connections through those ports).






39. The result of using a private key to encrypt a hash value for identification purposes within a PKI system. The signature can be decoded by the originator's public key - verifying his identity and providing non-repudiation. A valid digital signature g






40. The means by which a recipient of a message can ensure the identity of the sender and that neither party can deny having sent or received the message. The most common method is through digital certificates.






41. The act of using numerous electronic serial numbers on a cell phone until a valid number is located.






42. don't ping






43. A security objective that ensures a resource can be accessed only by authorized users. This is also the property that sensitive information is not disclosed to unauthorized individuals - entities - or processes.






44. Management policy and procedures designed to maintain or restore business operations - including computer operations - possibly at an alternate location - in the event of emergencies - system failures - or disaster.






45. A simple PPP authentication mechanism in which the user name and password are transmitted in clear text to prove identity. PAP compares the user name and password to a table listing authorized users.






46. A denial-of-service technique that uses numerous hosts to perform the attack.






47. Cracking Tools






48. Access by information systems (or users) communicating from outside the information system security perimeter.






49. RPC Scan






50. A means of exchanging information from one entity to another using a process that does not provide an attacker the opportunity to reorder - delete - insert - or read information.