Test your basic knowledge |

CEH: Certified Ethical Hacker

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Idlescan






2. An e-mail protection method using a secret message or image that can be referenced on any official communication with the site; if an e-mail is received without the image or message - the recipient knows it is not legitimate.






3. A term representing the responsibility managers and their organizations have to provide information security to ensure the type of control - the cost of control - and the deployment of control are appropriate for the system being managed.






4. A means of restricting access to system resources based on the sensitivity (as represented by a label) of the information contained in the system resource and the formal authorization (that is - clearance) of users to access information of such sensi






5. A method of network traffic filtering that monitors the entire communications process - including the originator of the session and from which direction it started.






6. A computer security expert who performs security audits and penetration tests against systems or network segments - with the owner's full knowledge and permission - in an effort to increase security.






7. An attack with the goal of preventing authorized users from accessing services and preventing the normal operation of computers and networks.






8. Port 80/81/8080






9. Port 22






10. The change or growth of a project's scope






11. A means of exchanging information from one entity to another using a process that does not provide an attacker the opportunity to reorder - delete - insert - or read information.






12. A protocol used to pass control and error messages between nodes on the Internet.






13. A utility that sends an ICMP Echo message to determine if a specific IP address is accessible; if the message receives a reply - the address is reachable.






14. Security measures - such as a locked door - perimeter fence - or security guard - to prevent or deter physical access to a facility - resource - or information stored on physical media.






15. A device on a network.






16. A device that provides access between two or more networks. Gateways are typically used to connect dissimilar networks.






17. Hex 12






18. Whether purposeful or the result of malware or other attack - a backdoor is a hidden capability in a system or program for bypassing normal computer authentication systems.






19. The level of importance assigned to an IT asset






20. A TCP flag notifying an originating station that the preceding packet (or packets) has been received.






21. MAC Flooding






22. Formerly Redundant Array of Inexpensive Disks; a technology that provides increased storage functions and reliability through redundancy. This is achieved by combining multiple disk drive components into a logical unit - where data is distributed acr






23. Originally an extension of PPP - this is a protocol for authentication used within wireless networks. Works with multiple authentication measures.






24. Incremental Substitution






25. A technology where you advertise one IP address externally and data packets are rerouted to the appropriate IP address inside your network by a device providing translation services. In this way - IP addresses of machines on your internal network are






26. A security tool designed to protect a system or network against attacks by comparing traffic patterns against a list of both known attack signatures and general characteristics of how attacks may be carried out. Threats are rated and protective measu






27. A method of defining what rights and permissions an entity has to a given resource. In networking - Access Control Lists are commonly associated with firewall and router traffic filtering rules.






28. An inspection of a place where a company or individual proposes to work - to gather the necessary information for a design or risk assessment.






29. Phases of an attack






30. The default network authentication suite of protocols for Windows NT 4.0






31. The process of embedding information into a digital signal in a way that makes it difficult to remove.






32. A set of rules defined to screen network packets based on source address - destination address - or protocol; these rules determine whether the packet will be forwarded or discarded.






33. The exploitation of a security vulnerability






34. A limit on the amount of time or number of iterations or transmissions in computer and network technology a packet can experience before it will be discarded.






35. ACK Scan






36. A function that is easy to compute in one direction - yet believed to be difficult to compute in the opposite direction (finding its inverse) without special information - called the 'trapdoor.' Widely used in cryptography.






37. An Application layer protocol for sending electronic mail between servers.






38. An Application layer protocol used by local email clients to retrieve e-mail from a remote server over a TCP/IP connection.






39. Attacks on the actual programming code of an application.






40. The contents of a packet. A system attack requires the attacker to deliver a malicious payload that is acted upon and executed by the system.






41. Sending unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobile phones - PDAs - or laptop computers.






42. An evaluation consisting of a document review - interviews - and demonstrations. No hands-on testing is performed.






43. A method used to prevent IDS detection by dividing the request into multiple parts that are sent in different packets






44. A method of falsely identifying the source of data packets; often used by hackers to make it difficult to trace where an attack originated.






45. The Security Accounts Manager file in Windows stores all the password hashes for the system.






46. A comparison metric for different biometric devices and technologies; the point at which the false acceptance rate (FAR) equals the






47. ex 02






48. Part of a service contract where the level of service is formally defined; may be required as part of the initial pen test agreements.






49. A connectionless - layer 4 transport protocol. UDP is faster than TCP - but offers no reliability. A best effort is made to deliver the data - but no checks and verifications are performed to guarantee delivery. Therefore - UDP is termed a 'connectio






50. don't ping