Test your basic knowledge |

CEH: Certified Ethical Hacker

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. An attack where the hacker repeats a portion of a cryptographic exchange in hopes of fooling the system into setting up a communications channel.






2. A communications path - such as the Internet - authorized for data transmission within a computer system or network.






3. The science or study of protecting information - whether in transit or at rest - by using techniques to render the information unusable to anyone who does not possess the means to decrypt it.






4. A self-replicating - self-propagating - self-contained program that uses networking mechanisms to spread itself.






5. An application that monitors a computer or network to identify - and prevent - malware. AV is usually signature-based - and can take multiple actions on defined malware files/activity.






6. Actions - devices - procedures - techniques - or other measures intended to reduce the vulnerability of an information system.






7. An organization's threshold for the seven areas of information security responsibility. This level is established based on the objectives for maintaining confidentiality - integrity - and availability of the organization's IT assets and infrastructur






8. A form of fraud in which someone pretends to be someone else by assuming that person's identity - typically in order to access resources or obtain credit and other benefits in that person's name.






9. Window Scan






10. A computer system that performs tasks dictated by an attacker from a remote location. Zombies may be active or idle - and owners of the systems generally do not know their systems are compromised.






11. ICMP Type/Code 0-0






12. ICMP Timestamp






13. A hacking method for stealing the cookies used during a session build and replaying them for unauthorized connection purposes.






14. A free and popular version of the Unix operating system.






15. A computer process that requests a service from another computer and accepts the server's responses.






16. A symmetric key cryptographic algorithm that transforms a block of information at a time using a cryptographic key. For a block cipher algorithm - the length of the input block is the same as the length of the output block.






17. Port 23






18. A network traffic management technique designed to allow applications to specify the route a packet will take to a destination - regardless of what the route tables between the two systems say.






19. Chronological record of system activities to enable the reconstruction and examination of the sequence of events and changes in an event.






20. A network system of servers that translates numeric Internet Protocol (IP) addresses into human-friendly - hierarchical Internet addresses - and vice versa.






21. A pen testing method where the attacker knows all information about the internal network. It is designed to simulate an attack by a disgruntled systems administrator - or similar level.






22. A program or piece of code inserted into a system - usually covertly - with the intent of compromising the confidentiality - integrity - or availability of the victim's data - applications - or operating system. Malware consists of viruses - worms -






23. The process of pinging each address within a subnet to map potential targets. Ping sweeps are unreliable and easily detectable - but very fast.






24. The last portion of the SID that identifies the user to the system in Windows. A RID of 500 identifies the administrator account.






25. The process of recording activity on a system for monitoring and later review.






26. A method for detecting malicious code on a computer where the files are compared to signatures of known viruses stored in a database.






27. Transmitting one protocol encapsulated inside another protocol.






28. Wireless LAN standards created by IEEE. 802.11a runs at up to 54Mbps at 5GHz - 802.11b runs at 11Mbps at 2.4GHz - 802.11g runs at 54Mbps at 2.4GHz - and 802.11n can run upwards of 150MBps.






29. Devices - connected to one or more switches - grouped logically into a single broadcast domain. VLANs enable administrators to divide the devices connected to the switches into multiple VLANs without requiring separate physical switches.






30. A social-engineering attack using computer resources - such as e-mail or IRC.






31. A trusted entity that issues and revokes public key certificates. In a network - a CA is a trusted entity that issues - manages - and revokes security credentials and public keys for message encryption and/or authentication. Within a public key infra






32. A type of denial-of-service attack where a hacker sends thousands of SYN packets to the target with spoofed IP addresses.






33. Literally - 'not balanced or the same.' In computing - asymmetric refers to a difference in networking speeds upstream to downstream. In cryptography - it's the use of more than one key for encryption/authentication purposes.






34. Phases of an attack






35. Controls to detect anomalies or undesirable events occurring on a system.






36. The act of secretly listening to the private conversations of others without their consent. This can also be done over telephone lines (wiretapping) - e-mail - instant messaging - and other methods of communication considered private






37. Port Scanning






38. A virus that plants itself in a system's boot sector and infects the master boot record.






39. The process of transforming ciphertext into plaintext through the use of a cryptographic algorithm.






40. An authentication method on point-to-point links - using a three-way handshake and a mutually agreed-upon key.






41. A utility that sends an ICMP Echo message to determine if a specific IP address is accessible; if the message receives a reply - the address is reachable.






42. ICMP Ping






43. Attacks on the actual programming code of an application.






44. A type of malware that covertly collects information about a user.






45. Software that has advertisements embedded within. Generally displays ads in the form of pop-ups.






46. Any kind of connection that allows you to see all traffic passing by. Generally used in reference to a NIDS (network-based IDS) to monitor all traffic.






47. The central part of a computer or communications system hardware firmware - and software that implements the basic security procedures for controlling access to system resources.






48. Sending packets or requests to another system to gain information to be used to identify weaknesses and protect the system from attacks.






49. A software or hardware application or device that captures user keystrokes.






50. A symmetric key cipher where plaintext bits are combined with a pseudo-random cipher bit stream (keystream) - typically by an exclusive-or (XOR) operation. In a stream cipher the plaintext digits are encrypted one at a time - and the transformation o