Test your basic knowledge |

CEH: Certified Ethical Hacker

  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A protocol used for sending and receiving log information for nodes on a network.

2. A non-self-replicating program that appears to have a useful purpose - but in reality has a different - malicious purpose.

3. Defined in RFC 826 - ARP is a protocol used to map a known IP address to a physical (MAC) address.

4. The security property that data is not modified in an unauthorized and undetected manner. Also - the principle and measures taken to ensure that data received is in the exact same condition and state as when it was originally transmitted.

5. An adapter that provides the physical connection to send and receive data between the computer and the network media.

6. Paranoid scan timing

7. ICMP Type/Code 0-0

8. Self-contained network with a limited number of participants who extend limited trust to one another in order to accomplish an agreed-upon goal.

9. A type 0 ICMP message used to reply to ECHO requests. Used with ping to verify network layer connectivity between hosts.

10. A device on a network.

11. An authentication method on point-to-point links - using a three-way handshake and a mutually agreed-upon key.

12. The act of secretly listening to the private conversations of others without their consent. This can also be done over telephone lines (wiretapping) - e-mail - instant messaging - and other methods of communication considered private

13. A set of rules defined by a system administrator that indicates whether access is allowed or denied to resource objects.

14. The central part of a computer or communications system hardware firmware - and software that implements the basic security procedures for controlling access to system resources.

15. Ping Scan

16. A system used by the Securities and Exchange Commission (SEC) for companies and businesses to transmit required filings and information. The EDGAR database performs automated collection - validation - indexing - acceptance - and forwarding of submiss

17. A term trademarked by the Wi-Fi Alliance - used to define a standard for devices to use to connect to a wireless network.

18. A device set up to send a response on behalf of an end node to the requesting host. Proxies are generally used to obfuscate the host from the Internet.

19. A means of exchanging information from one entity to another using a process that does not provide an attacker the opportunity to reorder - delete - insert - or read information.

20. 1. The path a packet travels to reach the intended destination. Each individual device along the path traveled is called a hop. 2. Information contained on a device containing instructions for reaching other nodes on the network. This information can

21. A portion of memory used to temporarily store output or input data.

22. A standard for encrypting and authenticating MIME data; used primarily for Internet e-mail.

23. A denial-of-service technique that uses numerous hosts to perform the attack.

24. Port 31337

25. White hat

26. A software program for remotely controlling a Microsoft Windows computer system over a network. Generally considered malware.

27. A pen testing method where the attacker knows all information about the internal network. It is designed to simulate an attack by a disgruntled systems administrator - or similar level.

28. SYN Ping

29. Devices - connected to one or more switches - grouped logically into a single broadcast domain. VLANs enable administrators to divide the devices connected to the switches into multiple VLANs without requiring separate physical switches.

30. A set of rules defined to screen network packets based on source address - destination address - or protocol; these rules determine whether the packet will be forwarded or discarded.

31. The process of embedding information into a digital signal in a way that makes it difficult to remove.

32. An Application layer protocol - using TCP - for transporting files across an Internet connection. FTP transmits in clear text.

33. A class of algorithms for cryptography that use the same cryptographic key for both decryption and encryption.

34. ICMP Ping

35. The process of pinging each address within a subnet to map potential targets. Ping sweeps are unreliable and easily detectable - but very fast.

36. A background process found in Unix - Linux - Solaris - and other Unix-based operating systems.

37. An attack where the hacker repeats a portion of a cryptographic exchange in hopes of fooling the system into setting up a communications channel.

38. A social-engineering attack that manipulates the victim into calling the attacker for help.

39. ICMP Type/Code 11

40. A distance-vector routing protocol that employs the hop count as a routing metric. The 'hold down time -' used to define how long a route is held in memory - is 180 seconds. RIP prevents routing loops by implementing a limit on the number of hops all


42. An Internet routing protocol used to exchange routing information within an autonomous system.

43. Port Scanning

44. The process of using easily accessible DNS records to map a target network's internal hosts.

45. A protocol that uses a private key to encrypt data before transmitting confidential documents over the Internet; widely used on e-commerce - banking - and other sites requiring privacy.

46. A utility that traces a packet from your computer to an Internet host - showing how many hops the packet takes to reach the host and how long the packet requires to complete the hop.

47. An early network application that provides information on users currently logged on to a machine.

48. An encryption standard designed by Joan Daemen and Vincent Rijmen. Chosen by a NIST contest to be the Advanced Encryption Standard (AES).

49. Attacks that take advantage of the built-in code and scripts most off-the-shelf applications come with.

50. Method used by antivirus software to detect new - unknown viruses that have not yet been identified; based on a piece-by-piece examination of a program - looking for a sequence or sequences of instructions that differentiate the virus from 'normal' p