Test your basic knowledge |

CEH: Certified Ethical Hacker

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. One or more locations from which control is exercised over a computer - television broadcast - or telecommunications network.






2. ICMP Type/Code 11






3. The central part of a computer or communications system hardware firmware - and software that implements the basic security procedures for controlling access to system resources.






4. Safeguards or countermeasures to avoid - counteract - or minimize security risks.






5. An attacker who breaks into computer systems with malicious intent - without the owner's knowledge or permission.






6. Injecting traffic into the network to identify the operating system of a device.






7. A secret - typically consisting of only decimal digits - that a claimant memorizes and uses to authenticate his identity






8. ICMP Netmask






9. The condition of a resource being ready for use and accessible by authorized users.






10. A point of reference used to mark an initial state in order to manage change.






11. An agreement between the penetration tester and the client detailing the activities the tester is permitted to perform.






12. A step-by-step method of solving a problem. In computing security - an algorithm is a set of mathematical rules (logic) for the process of encryption and decryption






13. A distance-vector routing protocol that employs the hop count as a routing metric. The 'hold down time -' used to define how long a route is held in memory - is 180 seconds. RIP prevents routing loops by implementing a limit on the number of hops all






14. A self-replicating - self-propagating - self-contained program that uses networking mechanisms to spread itself.






15. A computer security expert who performs security audits and penetration tests against systems or network segments - with the owner's full knowledge and permission - in an effort to increase security.






16. A host designed to collect data on suspicious activity.






17. Idlescan






18. Sneaky scan timing






19. A denial-of-service attack where the attacker sends a ping to the network's broadcast address from the spoofed IP address of the target. All systems in the subnet then respond to the spoofed address - eventually flooding the device.






20. Controls internal to a system designed to resolve vulnerabilities and errors soon after they arise.






21. White hat






22. Cracking Tools






23. An authentication method on point-to-point links - using a three-way handshake and a mutually agreed-upon key.






24. Another term for firewalking






25. A free and popular version of the Unix operating system.






26. Window Scan






27. A wireless networking mode where all clients connect to the wireless network through a central access point.






28. A group of people - gathered together by a business entity - working to address a specific problem or goal.






29. Whether purposeful or the result of malware or other attack - a backdoor is a hidden capability in a system or program for bypassing normal computer authentication systems.






30. A small Trojan program that listens on port 777.






31. The combination of all IT assets - resources - components - and systems.






32. An e-mail protection method using a secret message or image that can be referenced on any official communication with the site; if an e-mail is received without the image or message - the recipient knows it is not legitimate.






33. A software or hardware defect that often results in system vulnerabilities.






34. A record showing which user has accessed a given resource and what operations the user performed during a given period.






35. Vulnerability Scanning






36. A partially protected zone on a network - not exposed to the full fury of the Internet - but not fully behind the firewall. This technique is typically used on parts of the network that must remain open to the public (such as a web server) but must a






37. Start of Authority record. This record identifies the primary name server for the zone. The SOA record contains the host name of the server responsible for all DNS records within the namespace - as well as the basic properties of the domain.






38. A piece of code intentionally inserted into a software system that will perform a malicious function when specified conditions are met at some future point.






39. A small space having two sets of interlocking doors; the first set of doors must close before the second set opens. Typically authentication is required for each door - often using different factors. For example - a smart card may open the first door






40. FIN Scan






41. A documented process for a procedure designed to be consistent - repeatable - and accountable.






42. Part of a service contract where the level of service is formally defined; may be required as part of the initial pen test agreements.






43. Terminal Access Controller Access-Control System. A remote authentication protocol that is used to communicate with an authentication server commonly used in Unix networks.






44. Authentication confirms the identity of the user or device. Authorization determines the privileges (rights) of the user or device. Accounting records the access attempts - both successful and unsuccessful.






45. A denial-of-service technique that uses numerous hosts to perform the attack.






46. ICMP Ping






47. A value used to control cryptographic operations - such as decryption -encryption - signature generation - and signature verification.






48. The secret portion of an asymmetric key pair typically used to decrypt or digitally sign data. The private key is never shared and is always used for decryption - with one notable exception: The private key is used to encrypt the digital signature.






49. A security tool designed to protect a system or network against attacks by comparing traffic patterns against a list of both known attack signatures and general characteristics of how attacks may be carried out. Threats are rated and protective measu






50. Monitoring of telephone or Internet conversations - typically by covert means.