Test your basic knowledge |

CEH: Certified Ethical Hacker

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The science or study of protecting information - whether in transit or at rest - by using techniques to render the information unusable to anyone who does not possess the means to decrypt it.






2. Transmission using channels or frequencies outside those normally used for data transfer; often used for error reporting.






3. Start of Authority record. This record identifies the primary name server for the zone. The SOA record contains the host name of the server responsible for all DNS records within the namespace - as well as the basic properties of the domain.






4. A hardware device used to log keystrokes covertly. Hardware keystroke loggers are very dangerous due to the fact that they cannot be detected through regular software/anti-malware scanning.






5. The process of recording activity on a system for monitoring and later review.






6. A standard for encrypting and authenticating MIME data; used primarily for Internet e-mail.






7. A software or hardware defect that often results in system vulnerabilities.






8. Version Detection Scan






9. A protocol defining packets that are able to be routed by a router.






10. A wireless access point that has either been installed on a secure company network without explicit authorization from a local network administrator - or has been created to allow a hacker to conduct a man-in-the-middle attack.






11. A fully qualified domain name consists of a host and domain name - including a top-level domain such as .com - .net - .mil - .edu -and so on.






12. A method of permitting only MAC addresses in a preapproved list network access. Addresses not matching are blocked.






13. A computer security expert who performs security audits and penetration tests against systems or network segments - with the owner's full knowledge and permission - in an effort to increase security.






14. The conveying of official access or legal power to a person or entity.






15. A software or hardware application or device that captures user keystrokes.






16. A network system of servers that translates numeric Internet Protocol (IP) addresses into human-friendly - hierarchical Internet addresses - and vice versa.






17. Port 80/81/8080






18. An Application layer protocol for sending electronic mail between servers.






19. An attack where the hacker repeats a portion of a cryptographic exchange in hopes of fooling the system into setting up a communications channel.






20. The change or growth of a project's scope






21. Chronological record of system activities to enable the reconstruction and examination of the sequence of events and changes in an event.






22. Content Addressable Memory table. Holds all the MAC-address-to-port mappings on a switch.






23. An e-mail message warning users of a nonexistent virus and encouraging them to pass on the message to other users.






24. Manipulating a search string with additional specific operators to search for vulnerabilities or very specific information.






25. MAC Flooding






26. White box test






27. An Internet routing protocol used to exchange routing information within an autonomous system.






28. The set of all hardware - firmware - and/or software components critical to IT security. Bugs or vulnerabilities occurring inside the TCB might jeopardize the security properties of the entire system.






29. Malware designed to install some sort of virus - backdoor - and so on - on a target system.






30. A device on a network.






31. Insane scan timing






32. An inspection of a place where a company or individual proposes to work - to gather the necessary information for a design or risk assessment.






33. Port 110






34. A set of related communications protocols operating together as a group to address communication at some or all of the seven layers of the OSI reference model.






35. The lack of clocking (imposed time ordering) on a bit stream.






36. When an authorized person allows (intentionally or unintentionally) someone to pass through a secure door - despite the fact that the intruder does not have a badge.






37. In a classful IPv4 subnet - this is the network number with all binary 0s in the subnet part of the number. When written in decimal - the zero subnet has the same number as the classful network number.






38. ACK Scan






39. A physical security attack where the attacker sifts through garbage and recycle bins for information that may be useful on current and future attacks






40. Paranoid scan timing






41. An attack that is direct in nature - usually where the attacker injects something into - or otherwise alters - the network or system target.






42. A cell phone attack in which the serial number from one cell phone is copied to another in an effort to copy the cell phone.






43. A network administration command-line tool available for many operating systems for querying the Domain Name System (DNS) to obtain domain name or IP address mappings or any other specific DNS record.






44. ICMP Ping






45. A piece of code intentionally inserted into a software system that will perform a malicious function when specified conditions are met at some future point.






46. A routing protocol developed to be used within a single organization.






47. The transmission of digital signals without precise clocking or synchronization.






48. A protocol that uses a private key to encrypt data before transmitting confidential documents over the Internet; widely used on e-commerce - banking - and other sites requiring privacy.






49. A protocol that allows a client computer to request services from a server and the server to return the results.






50. Activities to determine the extent to which a security control is implemented correctly - operating as intended - and producing the desired outcome with respect to meeting the security requirements for the system.