Test your basic knowledge |

CEH: Certified Ethical Hacker

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Evaluation in which testers attempt to penetrate the network.






2. A social-engineering attack using computer resources - such as e-mail or IRC.






3. The default network authentication suite of protocols for Windows NT 4.0






4. A section or subset of the network. Often a router or other routing device provides the end point of the segment.






5. A standard that provides best-practice recommendations on information security management for use by those responsible for initiating - implementing - or maintaining Information Security Management Systems (ISMS). Information security is defined with






6. All measures and techniques taken to gather information about an intended target. Footprinting can be passive or active.






7. A limited-function version of the Internetworking Operating System (IOS) - held in read-only memory in some earlier models of Cisco devices - capable of performing several seldom-needed low-level functions such as loading a new IOS into Flash memory






8. Layer 7 of the OSI reference model. The Application layer provides services to applications - which allow them access to the network. Protocols such as FTP and SMTP reside here.






9. An electronic version of junk mail. Unsolicited commercial e-mail sent to numerous recipients.






10. A storage buffer that transparently stores data so future requests for the same data can be served faster.






11. A network system of servers that translates numeric Internet Protocol (IP) addresses into human-friendly - hierarchical Internet addresses - and vice versa.






12. Normal scan timing






13. Network Scanning






14. Management policy and procedures designed to maintain or restore business operations - including computer operations - possibly at an alternate location - in the event of emergencies - system failures - or disaster.






15. A piece of code intentionally inserted into a software system that will perform a malicious function when specified conditions are met at some future point.






16. CAN-SPAM






17. Content Addressable Memory table. Holds all the MAC-address-to-port mappings on a switch.






18. Software or hardware components that restrict access between a protected network and the Internet - or between other sets of networks - to block unwanted use or attacks.






19. A denial-of-service technique that uses numerous hosts to perform the attack.






20. RPC Scan






21. Port 137/138/139






22. An authentication method on point-to-point links - using a three-way handshake and a mutually agreed-upon key.






23. Used for exchanging structured information - such as XML-based messages - in the implementation of web services






24. ICMP Type/Code 3






25. An international encoding standard - working within multiple languages and scripts - that represents each letter - digit - or symbol with a unique numeric value that applies across different platforms.






26. A method of external testing whereby several systems or resources are used together to effect an attack.






27. The process of a system providing a fully qualified domain name (FQDN) to a local name server - for resolution to its corresponding IP address.






28. Any circumstance or event with the potential to adversely impact organizationaloperations - organizational assets - or individuals through an information system via unauthorized access - destruction - disclosure - modification of information - and/or






29. The level of importance assigned to an IT asset






30. The rate at which a biometric system will incorrectly identify an unauthorized individual and allow them access (see false negative).






31. Port 161/162






32. A means of restricting access to system resources based on the sensitivity (as represented by a label) of the information contained in the system resource and the formal authorization (that is - clearance) of users to access information of such sensi






33. Port 31337






34. An informed decision to accept the potential for damage to or loss of an IT asset.






35. A security tool designed to protect a system or network against attacks by comparing traffic patterns against a list of both known attack signatures and general characteristics of how attacks may be carried out. Threats are rated and reported.






36. A standard for encrypting and authenticating MIME data; used primarily for Internet e-mail.






37. Version Detection Scan






38. A TCP flag notifying an originating station that the preceding packet (or packets) has been received.






39. The process of using an application to remotely identify open ports on a system (for example - whether systems allow connections through those ports).






40. An e-mail message warning users of a nonexistent virus and encouraging them to pass on the message to other users.






41. A technology where you advertise one IP address externally and data packets are rerouted to the appropriate IP address inside your network by a device providing translation services. In this way - IP addresses of machines on your internal network are






42. A piece of software - provided by the vendor - intended to update or fix known - discovered problems in a computer program or its supporting data.






43. Controls internal to a system designed to resolve vulnerabilities and errors soon after they arise.






44. An e-mail protection method using a secret message or image that can be referenced on any official communication with the site; if an e-mail is received without the image or message - the recipient knows it is not legitimate.






45. A means of exchanging information from one entity to another using a process that does not provide an attacker the opportunity to reorder - delete - insert - or read information.






46. Polite scan timing






47. The monetary value assigned to an IT asset.






48. A Windows-based GUI version of nmap.






49. A small space having two sets of interlocking doors; the first set of doors must close before the second set opens. Typically authentication is required for each door - often using different factors. For example - a smart card may open the first door






50. Hashing algorithm that results in a 128-bit output.