Test your basic knowledge |

CEH: Certified Ethical Hacker

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A domain composed of all the systems sharing any given physical transport media. Systems within a collision domain may collide with each other during the transmission of data. Collisions can be managed by CSMA/CD (collision detection) or CSMA/CA (col






2. Controlling access to a network by analyzing the headers of incoming and outgoing packets - and letting them pass or discarding them based on rule sets created by a network administrator. A packet filter allows or denies packets based on destination






3. Start of Authority record. This record identifies the primary name server for the zone. The SOA record contains the host name of the server responsible for all DNS records within the namespace - as well as the basic properties of the domain.






4. The condition of a resource being ready for use and accessible by authorized users.






5. Wrapper or Binder






6. A host designed to collect data on suspicious activity.






7. The basis of this kind of security is that an individual user - or program operating on the user's behalf - is allowed to specify explicitly the types of access other users (or programs executing on their behalf) may have to information under the use






8. Software or firmware intended to perform an unauthorized process that will have an adverse impact on the confidentiality - integrity - or availability of an information system. A virus - worm - Trojan horse - or other code-based entity that infects a






9. Nmap normal output






10. Originally an extension of PPP - this is a protocol for authentication used within wireless networks. Works with multiple authentication measures.






11. Content Addressable Memory table. Holds all the MAC-address-to-port mappings on a switch.






12. A three-step process computers execute to negotiate a connection with one another. The three steps are SYN - SYN/ACK - ACK.






13. In regard to hash algorithms - this occurs when two or more distinct inputs produce the same output.






14. NSA






15. The set of all hardware - firmware - and/or software components critical to IT security. Bugs or vulnerabilities occurring inside the TCB might jeopardize the security properties of the entire system.






16. A method of evaluating the security of a computer system or network by simulating an attack from a malicious source.






17. Provides router-to-router or host-to-network connections over asynchronous and synchronous circuits.






18. Also known as a digital certificate - this is an electronic file used to verify a user's identity - providing non-repudiation throughout the system It is also a set of data that uniquely identifies an entity. Certificates contain the entity's public






19. The concept of having more than one person required to complete a task






20. ICMP Type/Code 8






21. An unknown deficiency in software or some other product that results in a security vulnerability being identified.






22. A fully qualified domain name consists of a host and domain name - including a top-level domain such as .com - .net - .mil - .edu -and so on.






23. A Unix-like computer operating system descending from the BSD. Open-BSD includes a number of security features absent or optional in other operating systems.






24. IP Protocol Scan






25. Port 110






26. A backup facility with the electrical and physical components of a computer facility - but with no computer equipment in place. The site is ready to receive the necessary replacement computer equipment in the event the user has to move from his main






27. A U.S. Department of Defense (DoD) standard that sets basic requirements for assessing the effectiveness of computer security controls built into a computer system.






28. A step-by-step method of solving a problem. In computing security - an algorithm is a set of mathematical rules (logic) for the process of encryption and decryption






29. In penetration testing - enumeration is the act of querying a device or network segment thoroughly and systematically for information.






30. An attack that is direct in nature - usually where the attacker injects something into - or otherwise alters - the network or system target.






31. LM Hash for short passwords (under 7)






32. A method of external testing whereby several systems or resources are used together to effect an attack.






33. 1. The path a packet travels to reach the intended destination. Each individual device along the path traveled is called a hop. 2. Information contained on a device containing instructions for reaching other nodes on the network. This information can






34. A connection-oriented - layer 4 protocol for transporting data over network segments. TCP is considered reliable because it guarantees delivery and the proper reordering of transmitted packets. This protocol is used for most long-haul traffic on the






35. Wireless LAN standards created by IEEE. 802.11a runs at up to 54Mbps at 5GHz - 802.11b runs at 11Mbps at 2.4GHz - 802.11g runs at 54Mbps at 2.4GHz - and 802.11n can run upwards of 150MBps.






36. A computer system that performs tasks dictated by an attacker from a remote location. Zombies may be active or idle - and owners of the systems generally do not know their systems are compromised.






37. A partially protected zone on a network - not exposed to the full fury of the Internet - but not fully behind the firewall. This technique is typically used on parts of the network that must remain open to the public (such as a web server) but must a






38. A type of encryption where the same key is used to encrypt and decrypt the message.






39. A Canonical Name record within DNS - used to provide an alias for a domain name.






40. A communications channel that is being used for a purpose it was not intended for - usually to transfer information secretly.






41. A protocol for exchanging packets over a serial line.






42. A number assigned during TCP startup sessions that tracks how much information has been moved. This number is used by hackers when hijacking sessions.






43. Steps taken to identify and limit risks to an acceptable or reasonable level of exposure.






44. A software or hardware application or device that captures user keystrokes.






45. An e-mail message warning users of a nonexistent virus and encouraging them to pass on the message to other users.






46. An e-mail protection method using a secret message or image that can be referenced on any official communication with the site; if an e-mail is received without the image or message - the recipient knows it is not legitimate.






47. Sneaky scan timing






48. nmap






49. A point of reference used to mark an initial state in order to manage change.






50. A wireless LAN security standard developed by IEEE. Requires Temporal Key Integrity Protocol (TKIP) and Advanced Encryption Standard (AES).