Test your basic knowledge |

CEH: Certified Ethical Hacker

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A network system of servers that translates numeric Internet Protocol (IP) addresses into human-friendly - hierarchical Internet addresses - and vice versa.






2. An HTTP command to transmit text to a web server for processing. The opposite of an HTTP GET.






3. A network administration command-line tool available for many operating systems for querying the Domain Name System (DNS) to obtain domain name or IP address mappings or any other specific DNS record.






4. A free and popular version of the Unix operating system.






5. An Application layer protocol for managing devices on an IP network.






6. A small Trojan program that listens on port 777.






7. A malicious computer program with self-replication capabilities that attaches to another file and moves with the host from one computer to another.






8. Safeguards or countermeasures to avoid - counteract - or minimize security risks.






9. A list of IP addresses and corresponding MAC addresses stored on a local computer.






10. FIN Scan






11. Calculations of two components of risk: R - the magnitude of the potential loss (L) - and the probability - p - that the loss will occur.






12. A device on a network.






13. A set of rules defined to screen network packets based on source address - destination address - or protocol; these rules determine whether the packet will be forwarded or discarded.






14. Port 88






15. A computer virus that infects and spreads in multiple ways.






16. A connection-oriented - layer 4 protocol for transporting data over network segments. TCP is considered reliable because it guarantees delivery and the proper reordering of transmitted packets. This protocol is used for most long-haul traffic on the






17. Sending packets or requests to another system to gain information to be used to identify weaknesses and protect the system from attacks.






18. The process of determining if a network entity (user or service) is legitimate






19. A point-to-point connection between two endpoints created to exchangedata. Typically a tunnel is either an encrypted connection - or a connection using a protocol in a method for which it was not designed. An encrypted connection forms a point-to-poi






20. Black hat






21. A hybrid of the HTTP and SSL/TLS protocols that provides encrypted communication and secure identification of a web server.






22. A wireless LAN device that acts as a central point for all wireless traffic. The AP is connected to both the wireless LAN and the wired LAN - providing wireless clients access to network resources.






23. Baseband LAN specification developed by Xerox Corporation - Intel - and Digital Equipment Corporation. One of the least expensive - most widely deployed networking standards; uses the CSMA/CD method of media access control.






24. The secret portion of an asymmetric key pair typically used to decrypt or digitally sign data. The private key is never shared and is always used for decryption - with one notable exception: The private key is used to encrypt the digital signature.






25. A command that instructs the system processor to do nothing. Many overflow attacks involve stringing several NOP operations together (known as a NOP sled).






26. A VPN tunneling protocol with encryption. PPTP connects two nodes in a VPN by using one TCP port for negotiation and authentication and one IP protocol for data transfer.






27. nmap






28. A software license agreement; a contract between the 'licensor' and purchaser establishing the right to use the software.






29. Physical socket provided on routers and switches for cable connections between a computer and the router/switch. This connection enables the computer to configure - query - and troubleshoot the router/switch by use of a terminal emulator and a comman






30. A method of evaluating the security of a computer system or network by simulating an attack from a malicious source.






31. A denial-of-service technique that uses numerous hosts to perform the attack.






32. Traffic-passing technique used by bridges and switches in which traffic received on an interface is sent out all interfaces on the device except the interface on which the information was originally received. Traffic on a switch is flooded when it is






33. A structured set of criteria for evaluating computer security within products and systems produced by European countries; it has been largely replaced by the Common Criteria.






34. Evaluation in which testers attempt to penetrate the network.






35. An enumeration technique used to provide information about a computer system; generally used for operating system identification (also known as fingerprinting).






36. Aggressive scan timing






37. List Scan






38. A widely used authentication protocol developed at the MassachusettsInstitute of Technology (MIT). Kerberos authentication uses tickets - Ticket Granting Service - and Key Distribution Center.






39. Hex 29






40. Controlling access to a network by analyzing the headers of incoming and outgoing packets - and letting them pass or discarding them based on rule sets created by a network administrator. A packet filter allows or denies packets based on destination






41. A piece of software - provided by the vendor - intended to update or fix known - discovered problems in a computer program or its supporting data.






42. A device or service designed to obfuscate traffic between a client and the Internet. Generally used to make activity on the Internet as untraceable as possible.






43. Software that has advertisements embedded within. Generally displays ads in the form of pop-ups.






44. Injecting traffic into the network to identify the operating system of a device.






45. Text or data in its encrypted form; the result of plaintext being input into a cryptographic algorithm.






46. A method of network traffic filtering that monitors the entire communications process - including the originator of the session and from which direction it started.






47. A simple PPP authentication mechanism in which the user name and password are transmitted in clear text to prove identity. PAP compares the user name and password to a table listing authorized users.






48. A standard developed to enable routers to exchange messages containing information about routes to reach subnets in the network.






49. Formal description and evaluation of the vulnerabilities in an information system






50. The set of all hardware - firmware - and/or software components critical to IT security. Bugs or vulnerabilities occurring inside the TCB might jeopardize the security properties of the entire system.