Test your basic knowledge |

CEH: Certified Ethical Hacker

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A one-way mathematical function that generates a fixedlength numerical string (hash) from a given data input. MD5 and SHA-1 are hashing algorithms.






2. A group of people - gathered together by a business entity - working to address a specific problem or goal.






3. A portion of memory used to temporarily store output or input data.






4. A set of rules defined by a system administrator that indicates whether access is allowed or denied to resource objects.






5. A unique numerical string - created by a hashing algorithm on a given piece of data - used to verify data integrity. Generally hashes are used to verify the integrity of files after download (comparison to the hash value on the site before download)






6. IP Protocol Scan






7. A record showing which user has accessed a given resource and what operations the user performed during a given period.






8. Version Detection Scan






9. An outdated symmetric cipher encryption algorithm - previously U.S. government-approved and used by business and civilian government agencies. DES is no longer considered secure due to the ease with which the entire keyspace can be attempted using mo






10. An enumeration technique used to provide information about a computer system; generally used for operating system identification (also known as fingerprinting).






11. A physical security attack where the attacker sifts through garbage and recycle bins for information that may be useful on current and future attacks






12. A section or subset of the network. Often a router or other routing device provides the end point of the segment.






13. Sending unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobile phones - PDAs - or laptop computers.






14. Actions - devices - procedures - techniques - or other measures intended to reduce the vulnerability of an information system.






15. Wireless LAN standards created by IEEE. 802.11a runs at up to 54Mbps at 5GHz - 802.11b runs at 11Mbps at 2.4GHz - 802.11g runs at 54Mbps at 2.4GHz - and 802.11n can run upwards of 150MBps.






16. A connection-oriented - layer 4 protocol for transporting data over network segments. TCP is considered reliable because it guarantees delivery and the proper reordering of transmitted packets. This protocol is used for most long-haul traffic on the






17. A query and response protocol widely used for querying databases that store the registered users or assignees of an Internet resource - such as a domain name - an IP address - or an autonomous system.






18. A condition that occurs when more data is written to a buffer than it has space to store - and results in data corruption or other system errors. This is usually due to insufficient bounds checking - a bug - or improper configuration in the program c






19. In computer security - this is an algorithm that uses separate keys for encryption and decryption.






20. A security tool designed to protect a system or network against attacks by comparing traffic patterns against a list of both known attack signatures and general characteristics of how attacks may be carried out. Threats are rated and reported.






21. A wireless LAN security standard developed by IEEE. Requires Temporal Key Integrity Protocol (TKIP) and Advanced Encryption Standard (AES).






22. A limited-function version of the Internetworking Operating System (IOS) - held in read-only memory in some earlier models of Cisco devices - capable of performing several seldom-needed low-level functions such as loading a new IOS into Flash memory






23. A NAT method in which multiple internal hosts - using private IP addressing - can be mapped through a single public IP address using the session IDs and port numbers. An internal global IP address can support in excess of 65 -000 concurrent TCP and U






24. Layer 7 of the OSI reference model. The Application layer provides services to applications - which allow them access to the network. Protocols such as FTP and SMTP reside here.






25. A derogatory term used to describe an attacker - usually new to the field - who uses simple - easy-to-follow scripts or programs developed by others to attack computer systems and networks and deface websites.






26. A protocol used to pass control and error messages between nodes on the Internet.






27. A networking configuration where all nodes are connected in a circle with no terminated ends on the cable.






28. A protocol that allows a client computer to request services from a server and the server to return the results.






29. A standard for encrypting and authenticating MIME data; used primarily for Internet e-mail.






30. All measures and techniques taken to gather information about an intended target. Footprinting can be passive or active.






31. A function that is easy to compute in one direction - yet believed to be difficult to compute in the opposite direction (finding its inverse) without special information - called the 'trapdoor.' Widely used in cryptography.






32. Using conversation or some other interaction between people to gather useful information.






33. A partially protected zone on a network - not exposed to the full fury of the Internet - but not fully behind the firewall. This technique is typically used on parts of the network that must remain open to the public (such as a web server) but must a






34. The central part of a computer or communications system hardware firmware - and software that implements the basic security procedures for controlling access to system resources.






35. The process of sending a packet or frame toward the destination. In a switch - messages are forwarded only to the port they are addressed to.






36. A social-engineering effort in which the attacker pretends to be an employee - a valid user - or even an executive to elicit information or access.






37. An evaluation consisting of a document review - interviews - and demonstrations - as well as vulnerability scans and hands-on testing.






38. A nontechnical method of hacking. Social engineering is the art of manipulating people - whether in person (human-based) or via computing methods (computer-based) - into providing sensitive information.






39. An attack where the hacker repeats a portion of a cryptographic exchange in hopes of fooling the system into setting up a communications channel.






40. ICMP Netmask






41. FTP Bounce Attack






42. Nmap grepable output






43. Traffic-passing technique used by bridges and switches in which traffic received on an interface is sent out all interfaces on the device except the interface on which the information was originally received. Traffic on a switch is flooded when it is






44. Hex 29






45. A command used in HTTP and FTP to retrieve a file from a server.






46. A symmetric key cryptographic algorithm that transforms a block of information at a time using a cryptographic key. For a block cipher algorithm - the length of the input block is the same as the length of the output block.






47. Set of tools (applications or code) that enables administrator-level accessto a computer or computer network and is designed to obscure the fact that the system has been compromised. Rootkits are dangerous malware entities that provide administrator






48. Black hat






49. A defined measure of service within a network system






50. A type of attack used to deny service to legitimate users of a network resource by intentionally overloading the network with illegitimate TCP connection requests. SYN packets are sent repeatedly to the target - but the corresponding SYN/ACK response