Test your basic knowledge |

CEH: Certified Ethical Hacker

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Port 137/138/139






2. Vulnerability Scanning






3. The monetary value expected from the occurrence of a risk on an asset. It is mathematically expressed as single loss expectancy (SLE) = asset value (AV)






4. A software program for remotely controlling a Microsoft Windows computer system over a network. Generally considered malware.






5. Method used by antivirus software to detect new - unknown viruses that have not yet been identified; based on a piece-by-piece examination of a program - looking for a sequence or sequences of instructions that differentiate the virus from 'normal' p






6. Part of a service contract where the level of service is formally defined; may be required as part of the initial pen test agreements.






7. A set of hardware - software - people - policies - and procedures needed to create - manage - distribute - use - store - and revoke digital certificates.






8. A file system used by the Mac OS.






9. Port 31337






10. A backlog of packets stored in buffers and waiting to be forwarded over an interface.






11. An Application layer protocol used by local email clients to retrieve e-mail from a remote server over a TCP/IP connection.






12. An international organization composed of national standards bodies from over 75 countries. Developed the OSI reference model.






13. A protocol used to pass control and error messages between nodes on the Internet.






14. A standard developed to enable routers to exchange messages containing information about routes to reach subnets in the network.






15. A computer virus that infects and spreads in multiple ways.






16. A type of attack used to deny service to legitimate users of a network resource by intentionally overloading the network with illegitimate TCP connection requests. SYN packets are sent repeatedly to the target - but the corresponding SYN/ACK response






17. The result of using a private key to encrypt a hash value for identification purposes within a PKI system. The signature can be decoded by the originator's public key - verifying his identity and providing non-repudiation. A valid digital signature g






18. A mathematical operation requiring two binary inputs: If the inputs match - the output is a 0 - otherwise it is a 1.






19. Using conversation or some other interaction between people to gather useful information.






20. Devices - connected to one or more switches - grouped logically into a single broadcast domain. VLANs enable administrators to divide the devices connected to the switches into multiple VLANs without requiring separate physical switches.






21. A group of penetration testers that assess the security of an organization - which is often unaware of the existence of the team or the exact assignment.






22. A string used for authentication in SNMP. The public community string is used for read-only searches - whereas the private community string is used for read/write. Community strings are transmitted in clear text in SNMPv1. SNMPv3 provides encryption






23. An attack that exploits the common mistake many people make when installing operating systems






24. ICMP Ping






25. A standard for encrypting and authenticating MIME data; used primarily for Internet e-mail.






26. Port 389






27. A software license agreement; a contract between the 'licensor' and purchaser establishing the right to use the software.






28. An attack technique that tricks your DNS server into believing it has received authentic information when - in reality - it has been provided fraudulent data. DNS cache poisoning affects user traffic by sending it to erroneous or malicious end points






29. The process of embedding information into a digital signal in a way that makes it difficult to remove.






30. A technology where you advertise one IP address externally and data packets are rerouted to the appropriate IP address inside your network by a device providing translation services. In this way - IP addresses of machines on your internal network are






31. A Windows-based GUI version of nmap.






32. An adapter that provides the physical connection to send and receive data between the computer and the network media.






33. Software code - a portion of data - or sequence of commands intended to take advantage of a bug or vulnerability in order to cause unintended or unanticipated behavior to occur on computer software or hardware.






34. The rate at which a biometric system will incorrectly reject an access attempt by an authorized user.






35. A measurable - physical characteristic used to recognize the identity - or verify the claimed identity - of an applicant. Facial images - fingerprints - and handwriting samples are all examples of biometrics.






36. A section or subset of the network. Often a router or other routing device provides the end point of the segment.






37. A free - open source version of the Berkeley Software Distribution of Unix - often used in embedded systems.






38. The act of using numerous electronic serial numbers on a cell phone until a valid number is located.






39. A sublayer of layer 2 of the OSI model - the Data Link layer. It provides addressing and channel access control mechanisms that enable several terminals or network nodes to communicate within a multipoint network.






40. Malware designed to install some sort of virus - backdoor - and so on - on a target system.






41. ICMP Netmask






42. Malicious code that uses a polymorphic engine to mutate while keeping the original algorithm intact; the code changes itself each time it runs - but the function of the code will not change.






43. The act of dialing all numbers within an organization to discover open modems.






44. Window Scan






45. Attacks on the actual programming code of an application.






46. Nmap normal output






47. A network administration command-line tool available for many operating systems for querying the Domain Name System (DNS) to obtain domain name or IP address mappings or any other specific DNS record.






48. A Unix-like computer operating system descending from the BSD. Open-BSD includes a number of security features absent or optional in other operating systems.






49. A value assigned to uniquely identify a single wide area network (WAN) in wireless LANs. SSIDs are broadcast by default - and are sent in the header of every packet. SSIDs provide no encryption or security.






50. A brand name of analog scrambling and de-scrambling equipment for cable and satellite television - invented primarily to keep consumer Television receive-only (TVRO) satellite equipment from receiving TV programming except on a subscription basis.