Test your basic knowledge |

CEH: Certified Ethical Hacker

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A computer process that requests a service from another computer and accepts the server's responses.






2. A command that instructs the system processor to do nothing. Many overflow attacks involve stringing several NOP operations together (known as a NOP sled).






3. A network system of servers that translates numeric Internet Protocol (IP) addresses into human-friendly - hierarchical Internet addresses - and vice versa.






4. A social-engineering attack that manipulates the victim into calling the attacker for help.






5. A formal set of rules describing data transmission - especially across a network. A protocol determines the type of error checking - the data compression method - how the sending device will indicate completion - how the receiving device will indicat






6. A device on a network.






7. nmap






8. NSA






9. An environmentally conditioned workspace partially equipped with IT and telecommunications equipment to support relocated IT operations in the event of a significant disruption.






10. The lack of clocking (imposed time ordering) on a bit stream.






11. A term trademarked by the Wi-Fi Alliance - used to define a standard for devices to use to connect to a wireless network.






12. A backup facility with the electrical and physical components of a computer facility - but with no computer equipment in place. The site is ready to receive the necessary replacement computer equipment in the event the user has to move from his main






13. A string used for authentication in SNMP. The public community string is used for read-only searches - whereas the private community string is used for read/write. Community strings are transmitted in clear text in SNMPv1. SNMPv3 provides encryption






14. ICMP Type/Code 3-13






15. Sending packets or requests to another system to gain information to be used to identify weaknesses and protect the system from attacks.






16. A communications protocol used for browsing the Internet.






17. RPC Scan






18. An extensible mechanism for e-mail. A variety of MIME types exist for sending content such as audio - binary - or video using the Simple Mail Transfer Protocol (SMTP).






19. Used to find the domain name associated with an IP address; the opposite of a DNS lookup.






20. Conversion of plaintext to ciphertext through the use of a cryptographic algorithm.






21. An information assurance strategy in which multiple layers of defense are placed throughout an Information Technology system.






22. A means of exchanging information from one entity to another using a process that does not provide an attacker the opportunity to reorder - delete - insert - or read information.






23. UDP Scan






24. Metamorphic Virus






25. 18 U.S.C. 1029






26. An international encoding standard - working within multiple languages and scripts - that represents each letter - digit - or symbol with a unique numeric value that applies across different platforms.






27. A computer virus that infects and spreads in multiple ways.






28. Steps taken to identify and limit risks to an acceptable or reasonable level of exposure.






29. An authentication method on point-to-point links - using a three-way handshake and a mutually agreed-upon key.






30. LAN standard - defined by ANSI X3T9.5 - specifying a 100Mbps token-passing network using fiber-optic cable and a dualring architecture for redundancy - with transmission distances of up to two kilometers.






31. A legal limit on the amount of financial liability and remedies the organization is responsible for taking on.






32. An attack where the hacker repeats a portion of a cryptographic exchange in hopes of fooling the system into setting up a communications channel.






33. A Canonical Name record within DNS - used to provide an alias for a domain name.






34. A system used by the Securities and Exchange Commission (SEC) for companies and businesses to transmit required filings and information. The EDGAR database performs automated collection - validation - indexing - acceptance - and forwarding of submiss






35. A VPN tunneling protocol with encryption. PPTP connects two nodes in a VPN by using one TCP port for negotiation and authentication and one IP protocol for data transfer.






36. An organization's threshold for the seven areas of information security responsibility. This level is established based on the objectives for maintaining confidentiality - integrity - and availability of the organization's IT assets and infrastructur






37. A standard that provides best-practice recommendations on information security management for use by those responsible for initiating - implementing - or maintaining Information Security Management Systems (ISMS). Information security is defined with






38. ICMP Ping






39. Safeguards or countermeasures to avoid - counteract - or minimize security risks.






40. A function that is easy to compute in one direction - yet believed to be difficult to compute in the opposite direction (finding its inverse) without special information - called the 'trapdoor.' Widely used in cryptography.






41. An informed decision to accept the potential for damage to or loss of an IT asset.






42. A term representing the responsibility managers and their organizations have to provide information security to ensure the type of control - the cost of control - and the deployment of control are appropriate for the system being managed.






43. A software or hardware defect that often results in system vulnerabilities.






44. The concept of having more than one person required to complete a task






45. The process of pinging each address within a subnet to map potential targets. Ping sweeps are unreliable and easily detectable - but very fast.






46. A social-engineering attack using computer resources - such as e-mail or IRC.






47. A documented process for a procedure designed to be consistent - repeatable - and accountable.






48. The ability to trace actions performed on a system to a specific user or system entity.






49. An attack in which a hacker steps between two ends of an already-established communication session and uses specialized tools to guess sequence numbers to take over the channel.






50. A backlog of packets stored in buffers and waiting to be forwarded over an interface.